Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
F0DgoRk0p1.exe

Overview

General Information

Sample name:F0DgoRk0p1.exe
renamed because original name is a hash value
Original sample name:d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311.exe
Analysis ID:1589029
MD5:7bea2772a00141a510d2b2e2367597e1
SHA1:1d38623ab62345c2d9f9f79b9f50849bbf9392ef
SHA256:d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • F0DgoRk0p1.exe (PID: 7828 cmdline: "C:\Users\user\Desktop\F0DgoRk0p1.exe" MD5: 7BEA2772A00141A510D2B2E2367597E1)
    • RegSvcs.exe (PID: 8024 cmdline: "C:\Users\user\Desktop\F0DgoRk0p1.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            7.2.RegSvcs.exe.1b0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              7.2.RegSvcs.exe.1b0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                7.2.RegSvcs.exe.1b0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  7.2.RegSvcs.exe.1b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x3455f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x345d1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x3465b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x346ed:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x34757:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x347c9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x3485f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x348ef:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  7.2.RegSvcs.exe.1b0000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x31697:$s2: GetPrivateProfileString
                  • 0x30d0c:$s3: get_OSFullName
                  • 0x323df:$s5: remove_Key
                  • 0x32567:$s5: remove_Key
                  • 0x33504:$s6: FtpWebRequest
                  • 0x34541:$s7: logins
                  • 0x34ab3:$s7: logins
                  • 0x377b8:$s7: logins
                  • 0x37876:$s7: logins
                  • 0x391c9:$s7: logins
                  • 0x38410:$s9: 1.85 (Hash, version 2, native byte-order)
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
                  Source: F0DgoRk0p1.exeReversingLabs: Detection: 83%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: F0DgoRk0p1.exeJoe Sandbox ML: detected
                  Source: F0DgoRk0p1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: F0DgoRk0p1.exe, 00000001.00000003.1274037048.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, F0DgoRk0p1.exe, 00000001.00000003.1272916576.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: F0DgoRk0p1.exe, 00000001.00000003.1274037048.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, F0DgoRk0p1.exe, 00000001.00000003.1272916576.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068445A GetFileAttributesW,FindFirstFileW,FindClose,1_2_0068445A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068C6D1 FindFirstFileW,FindClose,1_2_0068C6D1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0068C75C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0068EF95
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0068F0F2
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0068F3F3
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_006837EF
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00683B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00683B12
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0068BCBC

                  Networking

                  barindex
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006922EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,1_2_006922EE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000007.00000002.2509039021.00000000024C9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000023E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2507939358.0000000000742000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000023E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000007.00000002.2509039021.00000000023E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00694164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00694164
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00694164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00694164
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00693F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00693F66
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_0068001C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ACABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_006ACABC

                  System Summary

                  barindex
                  Source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: This is a third-party compiled AutoIt script.1_2_00623B3A
                  Source: F0DgoRk0p1.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cf39704e-8
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_2bf8ae2c-d
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00623633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,1_2_00623633
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,1_2_006AC1AC
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,1_2_006AC498
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC57D SendMessageW,NtdllDialogWndProc_W,1_2_006AC57D
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,1_2_006AC5FE
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC860 NtdllDialogWndProc_W,1_2_006AC860
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC8BE NtdllDialogWndProc_W,1_2_006AC8BE
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC88F NtdllDialogWndProc_W,1_2_006AC88F
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC93E ClientToScreen,NtdllDialogWndProc_W,1_2_006AC93E
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AC909 NtdllDialogWndProc_W,1_2_006AC909
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ACA7C GetWindowLongW,NtdllDialogWndProc_W,1_2_006ACA7C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ACABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_006ACABC
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00621287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,74D2C8D0,NtdllDialogWndProc_W,1_2_00621287
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00621290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,1_2_00621290
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AD3B8 NtdllDialogWndProc_W,1_2_006AD3B8
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AD43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,1_2_006AD43E
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0062167D NtdllDialogWndProc_W,1_2_0062167D
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006216DE GetParent,NtdllDialogWndProc_W,1_2_006216DE
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006216B5 NtdllDialogWndProc_W,1_2_006216B5
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006AD78C NtdllDialogWndProc_W,1_2_006AD78C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0062189B NtdllDialogWndProc_W,1_2_0062189B
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ABC5D NtdllDialogWndProc_W,CallWindowProcW,1_2_006ABC5D
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ABF30 NtdllDialogWndProc_W,1_2_006ABF30
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006ABF8C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,1_2_006ABF8C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,1_2_0068A1EF
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006785B1 GetCurrentProcess,OpenProcessToken,CloseHandle,CreateProcessWithLogonW,1_2_006785B1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006851BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_006851BD
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0062E6A01_2_0062E6A0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064D9751_2_0064D975
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0062FCE01_2_0062FCE0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006421C51_2_006421C5
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006562D21_2_006562D2
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006A03DA1_2_006A03DA
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0065242E1_2_0065242E
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006425FA1_2_006425FA
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0067E6161_2_0067E616
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006366E11_2_006366E1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0065878F1_2_0065878F
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006568441_2_00656844
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006A08571_2_006A0857
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006388081_2_00638808
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006888891_2_00688889
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064CB211_2_0064CB21
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00656DB61_2_00656DB6
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00636F9E1_2_00636F9E
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006330301_2_00633030
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064F1D91_2_0064F1D9
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006431871_2_00643187
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006212871_2_00621287
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006414841_2_00641484
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006355201_2_00635520
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006476961_2_00647696
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006357601_2_00635760
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006419781_2_00641978
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00659AB51_2_00659AB5
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006A7DDB1_2_006A7DDB
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064BDA61_2_0064BDA6
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00641D901_2_00641D90
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0062DF001_2_0062DF00
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00633FE01_2_00633FE0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_016B66E01_2_016B66E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0213A6E07_2_0213A6E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02134A887_2_02134A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02133E707_2_02133E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_021341B87_2_021341B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0213DD107_2_0213DD10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0213DD087_2_0213DD08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05CD25887_2_05CD2588
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05CD13D87_2_05CD13D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05CD3D287_2_05CD3D28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_05CD36407_2_05CD3640
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: String function: 00640AE3 appears 70 times
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: String function: 00627DE1 appears 36 times
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: String function: 00648900 appears 42 times
                  Source: F0DgoRk0p1.exe, 00000001.00000003.1276906463.0000000003EB3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs F0DgoRk0p1.exe
                  Source: F0DgoRk0p1.exe, 00000001.00000003.1273734375.000000000400D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs F0DgoRk0p1.exe
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename07823960-0dbd-43bb-aade-b6626acc7f4a.exe0 vs F0DgoRk0p1.exe
                  Source: F0DgoRk0p1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068A06A GetLastError,FormatMessageW,1_2_0068A06A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006781CB AdjustTokenPrivileges,CloseHandle,1_2_006781CB
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006787E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_006787E1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_0068B333
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0069EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_0069EE0D
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006983BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,1_2_006983BB
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00624E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_00624E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeFile created: C:\Users\user\AppData\Local\Temp\aut1CCD.tmpJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000007.00000002.2509039021.00000000024F9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024E7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: F0DgoRk0p1.exeReversingLabs: Detection: 83%
                  Source: unknownProcess created: C:\Users\user\Desktop\F0DgoRk0p1.exe "C:\Users\user\Desktop\F0DgoRk0p1.exe"
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\F0DgoRk0p1.exe"
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\F0DgoRk0p1.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Binary string: wntdll.pdbUGP source: F0DgoRk0p1.exe, 00000001.00000003.1274037048.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, F0DgoRk0p1.exe, 00000001.00000003.1272916576.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: F0DgoRk0p1.exe, 00000001.00000003.1274037048.0000000003D90000.00000004.00001000.00020000.00000000.sdmp, F0DgoRk0p1.exe, 00000001.00000003.1272916576.0000000003EE0000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_007349E0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,1_2_007349E0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00648945 push ecx; ret 1_2_00648958
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_006248D7
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006A5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_006A5376
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00643187 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00643187
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: F0DgoRk0p1.exe PID: 7828, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeAPI/Special instruction interceptor: Address: 16B6304
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024C9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.0000000002415000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-102358
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeAPI coverage: 4.5 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068445A GetFileAttributesW,FindFirstFileW,FindClose,1_2_0068445A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068C6D1 FindFirstFileW,FindClose,1_2_0068C6D1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0068C75C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0068EF95
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0068F0F2
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0068F3F3
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_006837EF
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00683B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00683B12
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0068BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0068BCBC
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006249A0
                  Source: RegSvcs.exe, 00000007.00000002.2509039021.0000000002415000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000007.00000002.2509039021.0000000002415000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1279940617.00000000015D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: RegSvcs.exe, 00000007.00000002.2510603755.0000000005774000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeAPI call chain: ExitProcess graph end nodegraph_1-101157
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeAPI call chain: ExitProcess graph end nodegraph_1-103497
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeAPI call chain: ExitProcess graph end nodegraph_1-101376

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_02137078 CheckRemoteDebuggerPresent,7_2_02137078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00693F09 BlockInput,1_2_00693F09
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00623B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00623B3A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00655A7C RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,1_2_00655A7C
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_007349E0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,1_2_007349E0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_016B6570 mov eax, dword ptr fs:[00000030h]1_2_016B6570
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_016B65D0 mov eax, dword ptr fs:[00000030h]1_2_016B65D0
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_016B4F20 mov eax, dword ptr fs:[00000030h]1_2_016B4F20
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006780A9 GetTokenInformation,GetLastError,GetProcessHeap,RtlAllocateHeap,GetTokenInformation,1_2_006780A9
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0064A155
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064A124 SetUnhandledExceptionFilter,1_2_0064A124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 239008Jump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006787B1 LogonUserW,1_2_006787B1
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00623B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00623B3A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_006248D7
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00684C7F mouse_event,1_2_00684C7F
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\F0DgoRk0p1.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00677CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_00677CAF
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0067874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_0067874B
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: F0DgoRk0p1.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_0064862B cpuid 1_2_0064862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00654E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00654E87
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00661E06 GetUserNameW,1_2_00661E06
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00653F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,1_2_00653F3A
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_006249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006249A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: F0DgoRk0p1.exe PID: 7828, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8024, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_81
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_XP
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_XPe
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_VISTA
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_7
                  Source: F0DgoRk0p1.exeBinary or memory string: WIN_8
                  Source: F0DgoRk0p1.exe, 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2509039021.0000000002415000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: F0DgoRk0p1.exe PID: 7828, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8024, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.1b0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.F0DgoRk0p1.exe.3d00000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: F0DgoRk0p1.exe PID: 7828, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 8024, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00696283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00696283
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00696747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00696747
                  Source: C:\Users\user\Desktop\F0DgoRk0p1.exeCode function: 1_2_00657AA1 RpcBindingSetOption,_LocaleUpdate::_LocaleUpdate,_memset,WideCharToMultiByte,GetLastError,_memset,1_2_00657AA1
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  21
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets651
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  F0DgoRk0p1.exe83%ReversingLabsWin32.Trojan.AutoitInject
                  F0DgoRk0p1.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/F0DgoRk0p1.exe, 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.2509039021.00000000023E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024AE000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000007.00000002.2509039021.00000000024C9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000023E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2509039021.00000000024AE000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1589029
                            Start date and time:2025-01-11 08:36:19 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 37s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:12
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:F0DgoRk0p1.exe
                            renamed because original name is a hash value
                            Original Sample Name:d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 54
                            • Number of non-executed functions: 275
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: F0DgoRk0p1.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1fpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                            • ip-api.com/json/
                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • ip-api.com/line/?fields=hosting
                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comfpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                            • 208.95.112.1
                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 208.95.112.1
                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSfpY3HP2cnH.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            aik1mr9TOq.exeGet hashmaliciousPredatorBrowse
                            • 208.95.112.1
                            DUWPFaZd3a.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 208.95.112.1
                            tb4B9ni6vl.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\F0DgoRk0p1.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244736
                            Entropy (8bit):6.779518683184602
                            Encrypted:false
                            SSDEEP:6144:inqisWkmX7fB2hE0iFan4Eyl2R5NEbbFLrlpt/s+U+wi2xGQNZTB4RC:inqiEhP4vSGtvXEkAZ11
                            MD5:AFC04203518DD91A49F79EEED80AEE05
                            SHA1:E8A9D6CD1F1466F1FAB0FBE6447772EEA2B04F67
                            SHA-256:781130BD4BFEC3A4069DEE937F541E69D9439A4591E9C02F19C7379108CEEF76
                            SHA-512:6934A8EF42EB8133B5466483E125AA5A8565DFC800727122B23FDEF652F283C99488BBC8B69C3D15FDE3BEABC5FF9469CED583AECDCC3423C4C8068486090860
                            Malicious:false
                            Reputation:low
                            Preview:...84ZEOE3Y7..D3.BEWPXVHr87ZEOA3Y7TSD3MBEWPXVH287ZEOA3Y7TSD3.BEW^G.F2.>.d.@....;-@m2787*7%.[V4+ 5.;Rt!1]m++w...h_WS?kBL9}7TSD3MB..PX.I18.s.*A3Y7TSD3.BGV[Y]H2.4ZEGA3Y7TS..NBEwPXV.187Z.OA.Y7TQD3IBEWPXVH687ZEOA3Y.PSD1MBEWPXTHr.7ZUOA#Y7TST3MREWPXVH"87ZEOA3Y7TS$.NB.WPXV.18._EOA3Y7TSD3MBEWPXVH283ZIOA3Y7TSD3MBEWPXVH287ZEOA3Y7TSD3MBEWPXVH287ZEOA3Y7TSD.MBMWPXVH287ZEOI.Y7.SD3MBEWPXVH.LR"1OA3.WSD.MBE.SXVJ287ZEOA3Y7TSD3mBE7~*%:Q87Z.JA3Y.WSD5MBE.SXVH287ZEOA3Y7.SDsc0 ;?;VH>87ZEOE3Y5TSD.NBEWPXVH287ZEO.3YuTSD3MBEWPXVH287Z.B3Y7TS.3MBGWUX..08;mDOB3Y7USD5MBEWPXVH287ZEOA3Y7TSD3MBEWPXVH287ZEOA3Y7TSD3MBEWM.....d.2.9;0.u.T.A..C..1.w8.P.:'....I....w-P.{8.Uu...P....F.J@.Q......:N>O[.@{\%.P....ew<rs.\+.;..*a.]Kf.~...n....@5m...'...-(y1(&$W.d;#.3Z.5.RD3MB........^"..l0V)`A<e...dJ.....;OA3=7TS63MB$WPX.H28XZEO/3Y7*SD33BEW.XVHr87ZrOA3|7TS)3MBaWPX(H28.'J@..^'..3MBEWe..x.U........e5.3.'o...,.s..@..<1.#..t..K.3..%j\\f..4X1PVF4IAIj^.....5^AJC4]4XnJx...v.~.....4....M./D3MBEW.XV.287..O.3Y7.S.3..EWP.H.8.Z...3
                            Process:C:\Users\user\Desktop\F0DgoRk0p1.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):154636
                            Entropy (8bit):7.916847135549542
                            Encrypted:false
                            SSDEEP:3072:dzsF6MLQAjykQEHC0ee8G7gX8oINcpZz2GHDYj566NFjjB9l8scxEPlP:d3MekQEi0noImp0GHMj0gljGEPlP
                            MD5:FF33061AA719F4E4D98697C7D4687D82
                            SHA1:D8EB537851D42E006224741E4D4167E71ABD9351
                            SHA-256:40CEFBF166B2E0BEA95A495AA946FF1EE8260E920A3E2E3EB32C4EF89E9AA80B
                            SHA-512:BB50F356C001F661889CE88B28C74207C6049C074A24DC08A1E41B1344A91D519CDA3DA320A54BFA02F7C84AEACEBB7856A8DA8EAA75F1A38F086872D4AF8F6B
                            Malicious:false
                            Reputation:low
                            Preview:EA06......S..j.O...3}^..3...z.b.H.N&.....X.T.:h..f@...4.X.Q..i.2}..}....Z.;..-.)..o*..bU...W ...u+..c]...wx.^.h...s.]..9..,f+..V#T....s.J..5..Q...v.2..M.p.lz.t......j& ....A.....$..5........b.a..".........L. ..H.1.$.X!.p..tk.._<.I........6.M...$.....v9L.H. ....W.,..Z.b.J.X.m.*,..*.. ....,u.....a.7|.J...c.H's..Z.>...s.......M|...f..a..s. ....,Q..Z...0.N.Jx..U.n.....-S~.....CfW...a.......C...=..7P.N..^.~+I.p..=..[P..........T6Z\....P%....!..C.T..>...^.^-C.....y...J...wK=*...6r....-../gW..Mm..g.O..K.....Q&.U..I.]3.x&......._?..]^.C...ZS`..,.n..5d.K..Gc/;..'........n......K.7.P..3..".c........R.XX@..@.a.......'.n.B+..x.Ut..Cg..y.vY..g....<l.)s.@(....c...!.M.....L.Z9-..\.@c3J..V.M)4.M....l|..z.J..+.J..x...7m...........Sx2..lk..n@.a.......R...x@4GcSH.N9../?.3.Vf..EZ.6.].S.,..N.^......G.O'.9..)si........U.gG.q..j.Z....TZl..Y..%.).6.m.T+...q7.[..:l.oT..j4....x......IC..fu. .a5.H.z..J........1.R.u:$.....j...e8.V.U.....a....]..7.+<.ID...w.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                            Entropy (8bit):7.930782762851187
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.39%
                            • UPX compressed Win32 Executable (30571/9) 0.30%
                            • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            File name:F0DgoRk0p1.exe
                            File size:600'576 bytes
                            MD5:7bea2772a00141a510d2b2e2367597e1
                            SHA1:1d38623ab62345c2d9f9f79b9f50849bbf9392ef
                            SHA256:d2b275edfe93caf7e90362a513f00ffec34f1b10df49d950db008a3417045311
                            SHA512:059070ca0a65c1f3c269328e9cc0831f3beec68cbe0e98be4656913296747947182d55aaf7fd14e8553edcbbaf2550570e9d19c800852ce1b5e8ac8107fe921c
                            SSDEEP:12288:vquErHF6xC9D6DmR1J98w4oknqOOCyQfIwKT8bTgJp4pDVOPlDaZ:2rl6kD68JmlotQfET8bk+84
                            TLSH:1CD423C54AE1E423C66873B5C1799D685AA538728F8A3B5EC729F10EFC20303E856F5D
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x5149e0
                            Entrypoint Section:UPX1
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x674DE4DC [Mon Dec 2 16:48:28 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:fc6683d30d9f25244a50fd5357825e79
                            Instruction
                            pushad
                            mov esi, 004BF000h
                            lea edi, dword ptr [esi-000BE000h]
                            push edi
                            jmp 00007FF5ECC5A2DDh
                            nop
                            mov al, byte ptr [esi]
                            inc esi
                            mov byte ptr [edi], al
                            inc edi
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FF5ECC5A2BFh
                            mov eax, 00000001h
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            add ebx, ebx
                            jnc 00007FF5ECC5A2DDh
                            jne 00007FF5ECC5A2FAh
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FF5ECC5A2F1h
                            dec eax
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            jmp 00007FF5ECC5A2A6h
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            jmp 00007FF5ECC5A324h
                            xor ecx, ecx
                            sub eax, 03h
                            jc 00007FF5ECC5A2E3h
                            shl eax, 08h
                            mov al, byte ptr [esi]
                            inc esi
                            xor eax, FFFFFFFFh
                            je 00007FF5ECC5A347h
                            sar eax, 1
                            mov ebp, eax
                            jmp 00007FF5ECC5A2DDh
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FF5ECC5A29Eh
                            inc ecx
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FF5ECC5A290h
                            add ebx, ebx
                            jne 00007FF5ECC5A2D9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            add ebx, ebx
                            jnc 00007FF5ECC5A2C1h
                            jne 00007FF5ECC5A2DBh
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jnc 00007FF5ECC5A2B6h
                            add ecx, 02h
                            cmp ebp, FFFFFB00h
                            adc ecx, 02h
                            lea edx, dword ptr [edi+ebp]
                            cmp ebp, FFFFFFFCh
                            jbe 00007FF5ECC5A2E0h
                            mov al, byte ptr [edx]
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD4 build 31101
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD4 build 31101
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1512bc0x424.rsrc
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1150000x3c2bc.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1516e00xc.rsrc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x114bc40x48UPX1
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            UPX00x10000xbe0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            UPX10xbf0000x560000x55e0088f509ad548e32f9c59184e3e6664b04False0.9870473981077147data7.935113974245869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1150000x3d0000x3c80000f97e8d12a727c92d01dd18d400d0fcFalse0.9157210420971075data7.868258650562296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x1155ac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0x1156d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0x1158040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0x1159300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0x115c1c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0x115d480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0x116bf40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0x1174a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0x117a0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0x119fb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0x11b0640x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xcd4a00x50dataEnglishGreat Britain1.1375
                            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.9348739495798319
                            RT_STRING0xcda840x68adataEnglishGreat Britain0.9008363201911589
                            RT_STRING0xce1100x490dataEnglishGreat Britain0.9546232876712328
                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.9086161879895561
                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain1.0036855036855037
                            RT_STRING0xcf1f80x466dataEnglishGreat Britain1.0097690941385435
                            RT_STRING0xcf6600x158dataEnglishGreat Britain1.0319767441860466
                            RT_RCDATA0x11b4d00x35853data1.0003466852781921
                            RT_GROUP_ICON0x150d280x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x150da40x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x150dbc0x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x150dd40x14dataEnglishGreat Britain1.25
                            RT_VERSION0x150dec0xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0x150ecc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                            ADVAPI32.dllGetAce
                            COMCTL32.dllImageList_Remove
                            COMDLG32.dllGetOpenFileNameW
                            GDI32.dllLineTo
                            IPHLPAPI.DLLIcmpSendEcho
                            MPR.dllWNetUseConnectionW
                            ole32.dllCoGetObject
                            OLEAUT32.dllVariantInit
                            PSAPI.DLLGetProcessMemoryInfo
                            SHELL32.dllDragFinish
                            USER32.dllGetDC
                            USERENV.dllLoadUserProfileW
                            UxTheme.dllIsThemeActive
                            VERSION.dllVerQueryValueW
                            WININET.dllFtpOpenFileW
                            WINMM.dlltimeGetTime
                            WSOCK32.dllconnect
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 08:37:12.273101091 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:37:12.277940035 CET8049706208.95.112.1192.168.2.10
                            Jan 11, 2025 08:37:12.278266907 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:37:12.287286997 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:37:12.292115927 CET8049706208.95.112.1192.168.2.10
                            Jan 11, 2025 08:37:12.734138012 CET8049706208.95.112.1192.168.2.10
                            Jan 11, 2025 08:37:12.781094074 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:38:08.539568901 CET8049706208.95.112.1192.168.2.10
                            Jan 11, 2025 08:38:08.539679050 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:38:52.750765085 CET4970680192.168.2.10208.95.112.1
                            Jan 11, 2025 08:38:52.755737066 CET8049706208.95.112.1192.168.2.10
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 08:37:12.226069927 CET6178653192.168.2.101.1.1.1
                            Jan 11, 2025 08:37:12.233361959 CET53617861.1.1.1192.168.2.10
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 11, 2025 08:37:12.226069927 CET192.168.2.101.1.1.10x37dStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 08:37:12.233361959 CET1.1.1.1192.168.2.100x37dNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.1049706208.95.112.1808024C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 08:37:12.287286997 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 11, 2025 08:37:12.734138012 CET175INHTTP/1.1 200 OK
                            Date: Sat, 11 Jan 2025 07:37:12 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:02:37:09
                            Start date:11/01/2025
                            Path:C:\Users\user\Desktop\F0DgoRk0p1.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\F0DgoRk0p1.exe"
                            Imagebase:0x620000
                            File size:600'576 bytes
                            MD5 hash:7BEA2772A00141A510D2B2E2367597E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.1285910453.0000000003D00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:7
                            Start time:02:37:10
                            Start date:11/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\F0DgoRk0p1.exe"
                            Imagebase:0xe0000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2507195814.00000000001B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2509039021.0000000002415000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.7%
                              Dynamic/Decrypted Code Coverage:1.5%
                              Signature Coverage:9.3%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:174
                              execution_graph 100967 16b5a0b 100968 16b5a12 100967->100968 100969 16b5a1a 100968->100969 100970 16b5ab0 100968->100970 100974 16b56c0 100969->100974 100987 16b6360 9 API calls 100970->100987 100973 16b5a97 100988 16b30b0 100974->100988 100976 16b575f 100979 16b57b9 VirtualAlloc 100976->100979 100980 16b579d 100976->100980 100985 16b58c0 CloseHandle 100976->100985 100986 16b58d0 VirtualFree 100976->100986 100991 16b65d0 GetPEB 100976->100991 100978 16b5790 CreateFileW 100978->100976 100978->100980 100979->100980 100981 16b57da ReadFile 100979->100981 100982 16b59ba 100980->100982 100983 16b59ac VirtualFree 100980->100983 100981->100980 100984 16b57f8 VirtualAlloc 100981->100984 100982->100973 100983->100982 100984->100976 100984->100980 100985->100976 100986->100976 100987->100973 100993 16b6570 GetPEB 100988->100993 100990 16b373b 100990->100976 100992 16b65fa 100991->100992 100992->100978 100994 16b659a 100993->100994 100994->100990 100995 623633 100996 62366a 100995->100996 100997 6236e7 100996->100997 100998 623688 100996->100998 101033 6236e5 100996->101033 101002 65d0cc 100997->101002 101003 6236ed 100997->101003 100999 623695 100998->100999 101000 62374b PostQuitMessage 100998->101000 101005 65d154 100999->101005 101006 6236a0 100999->101006 101036 6236d8 101000->101036 101001 6236ca NtdllDefWindowProc_W 101001->101036 101044 631070 10 API calls Mailbox 101002->101044 101007 6236f2 101003->101007 101008 623715 SetTimer RegisterClipboardFormatW 101003->101008 101060 682527 71 API calls _memset 101005->101060 101012 623755 101006->101012 101013 6236a8 101006->101013 101009 65d06f 101007->101009 101010 6236f9 KillTimer 101007->101010 101014 62373e CreatePopupMenu 101008->101014 101008->101036 101022 65d074 101009->101022 101023 65d0a8 MoveWindow 101009->101023 101040 62443a Shell_NotifyIconW _memset 101010->101040 101011 65d0f3 101045 631093 332 API calls Mailbox 101011->101045 101042 6244a0 64 API calls _memset 101012->101042 101018 6236b3 101013->101018 101019 65d139 101013->101019 101014->101036 101025 65d124 101018->101025 101034 6236be 101018->101034 101019->101001 101059 677c36 59 API calls Mailbox 101019->101059 101020 65d166 101020->101001 101020->101036 101026 65d097 SetFocus 101022->101026 101027 65d078 101022->101027 101023->101036 101024 62370c 101041 623114 DeleteObject DestroyWindow Mailbox 101024->101041 101058 682d36 81 API calls _memset 101025->101058 101026->101036 101031 65d081 101027->101031 101027->101034 101043 631070 10 API calls Mailbox 101031->101043 101032 623764 101032->101036 101033->101001 101034->101001 101046 62443a Shell_NotifyIconW _memset 101034->101046 101038 65d118 101047 62434a 101038->101047 101040->101024 101041->101036 101042->101032 101043->101036 101044->101011 101045->101034 101046->101038 101048 624375 _memset 101047->101048 101061 624182 101048->101061 101051 6243fa 101053 624430 Shell_NotifyIconW 101051->101053 101054 624414 Shell_NotifyIconW 101051->101054 101055 624422 101053->101055 101054->101055 101065 62407c 101055->101065 101057 624429 101057->101033 101058->101032 101059->101033 101060->101020 101062 624196 101061->101062 101063 65d423 101061->101063 101062->101051 101087 682f94 62 API calls _W_store_winword 101062->101087 101063->101062 101064 65d42c DestroyCursor 101063->101064 101064->101062 101066 624098 101065->101066 101067 62416f Mailbox 101065->101067 101088 627a16 101066->101088 101067->101057 101070 6240b3 101093 627bcc 101070->101093 101071 65d3c8 LoadStringW 101074 65d3e2 101071->101074 101073 6240c8 101073->101074 101076 6240d9 101073->101076 101075 627b2e 59 API calls 101074->101075 101081 65d3ec 101075->101081 101077 6240e3 101076->101077 101078 624174 101076->101078 101102 627b2e 101077->101102 101111 628047 101078->101111 101083 6240ed _memset _wcscpy 101081->101083 101115 627cab 101081->101115 101085 624155 Shell_NotifyIconW 101083->101085 101084 65d40e 101086 627cab 59 API calls 101084->101086 101085->101067 101086->101083 101087->101051 101122 640db6 101088->101122 101090 627a3b 101132 628029 101090->101132 101094 627c45 101093->101094 101095 627bd8 __wsetenvp 101093->101095 101164 627d2c 101094->101164 101097 627c13 101095->101097 101098 627bee 101095->101098 101100 628029 59 API calls 101097->101100 101163 627f27 59 API calls Mailbox 101098->101163 101101 627bf6 _memmove 101100->101101 101101->101073 101103 627b40 101102->101103 101104 65ec6b 101102->101104 101172 627a51 101103->101172 101178 677bdb 59 API calls _memmove 101104->101178 101107 627b4c 101107->101083 101108 65ec75 101109 628047 59 API calls 101108->101109 101110 65ec7d Mailbox 101109->101110 101112 628052 101111->101112 101113 62805a 101111->101113 101179 627f77 59 API calls 2 library calls 101112->101179 101113->101083 101116 627cbf 101115->101116 101117 65ed4a 101115->101117 101180 627c50 101116->101180 101119 628029 59 API calls 101117->101119 101121 65ed55 __wsetenvp _memmove 101119->101121 101120 627cca 101120->101084 101124 640dbe 101122->101124 101125 640dd8 101124->101125 101127 640ddc std::exception::exception 101124->101127 101135 64571c 101124->101135 101152 6433a1 RtlDecodePointer 101124->101152 101125->101090 101153 64859b RaiseException 101127->101153 101129 640e06 101154 6484d1 58 API calls _free 101129->101154 101131 640e18 101131->101090 101133 640db6 Mailbox 59 API calls 101132->101133 101134 6240a6 101133->101134 101134->101070 101134->101071 101136 645797 101135->101136 101144 645728 101135->101144 101161 6433a1 RtlDecodePointer 101136->101161 101138 64579d 101162 648b28 58 API calls __getptd_noexit 101138->101162 101141 64575b RtlAllocateHeap 101142 64578f 101141->101142 101141->101144 101142->101124 101144->101141 101145 645783 101144->101145 101146 645733 101144->101146 101150 645781 101144->101150 101158 6433a1 RtlDecodePointer 101144->101158 101159 648b28 58 API calls __getptd_noexit 101145->101159 101146->101144 101155 64a16b 58 API calls __NMSG_WRITE 101146->101155 101156 64a1c8 58 API calls 6 library calls 101146->101156 101157 64309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101146->101157 101160 648b28 58 API calls __getptd_noexit 101150->101160 101152->101124 101153->101129 101154->101131 101155->101146 101156->101146 101158->101144 101159->101150 101160->101142 101161->101138 101162->101142 101163->101101 101165 627d3a 101164->101165 101167 627d43 _memmove 101164->101167 101165->101167 101168 627e4f 101165->101168 101167->101101 101169 627e62 101168->101169 101171 627e5f _memmove 101168->101171 101170 640db6 Mailbox 59 API calls 101169->101170 101170->101171 101171->101167 101173 627a5f 101172->101173 101174 627a85 _memmove 101172->101174 101173->101174 101175 640db6 Mailbox 59 API calls 101173->101175 101174->101107 101176 627ad4 101175->101176 101177 640db6 Mailbox 59 API calls 101176->101177 101177->101174 101178->101108 101179->101113 101181 627c5f __wsetenvp 101180->101181 101182 628029 59 API calls 101181->101182 101183 627c70 _memmove 101181->101183 101184 65ed07 _memmove 101182->101184 101183->101120 101185 647c56 101186 647c62 __getstream 101185->101186 101222 649e08 GetStartupInfoW 101186->101222 101188 647c67 101224 648b7c GetProcessHeap 101188->101224 101190 647cbf 101191 647cca 101190->101191 101307 647da6 58 API calls 3 library calls 101190->101307 101225 649ae6 101191->101225 101194 647cd0 101195 647cdb __RTC_Initialize 101194->101195 101308 647da6 58 API calls 3 library calls 101194->101308 101246 64d5d2 101195->101246 101198 647cea 101199 647cf6 GetCommandLineW 101198->101199 101309 647da6 58 API calls 3 library calls 101198->101309 101265 654f23 GetEnvironmentStringsW 101199->101265 101202 647cf5 101202->101199 101205 647d10 101208 647d1b 101205->101208 101310 6430b5 58 API calls 3 library calls 101205->101310 101275 654d58 101208->101275 101209 647d21 101210 647d2c 101209->101210 101311 6430b5 58 API calls 3 library calls 101209->101311 101289 6430ef 101210->101289 101213 647d34 101214 647d3f __wwincmdln 101213->101214 101312 6430b5 58 API calls 3 library calls 101213->101312 101295 6247d0 101214->101295 101217 647d53 101218 647d62 101217->101218 101313 643358 58 API calls _doexit 101217->101313 101314 6430e0 58 API calls _doexit 101218->101314 101221 647d67 __getstream 101223 649e1e 101222->101223 101223->101188 101224->101190 101315 643187 36 API calls 2 library calls 101225->101315 101227 649aeb 101316 649d3c InitializeCriticalSectionAndSpinCount __getstream 101227->101316 101229 649af0 101230 649af4 101229->101230 101318 649d8a TlsAlloc 101229->101318 101317 649b5c 61 API calls 2 library calls 101230->101317 101233 649af9 101233->101194 101234 649b06 101234->101230 101235 649b11 101234->101235 101319 6487d5 101235->101319 101238 649b53 101327 649b5c 61 API calls 2 library calls 101238->101327 101241 649b58 101241->101194 101242 649b32 101242->101238 101243 649b38 101242->101243 101326 649a33 58 API calls 4 library calls 101243->101326 101245 649b40 GetCurrentThreadId 101245->101194 101247 64d5de __getstream 101246->101247 101339 649c0b 101247->101339 101249 64d5e5 101250 6487d5 __calloc_crt 58 API calls 101249->101250 101251 64d5f6 101250->101251 101252 64d661 GetStartupInfoW 101251->101252 101253 64d601 @_EH4_CallFilterFunc@8 __getstream 101251->101253 101259 64d676 101252->101259 101260 64d7a5 101252->101260 101253->101198 101254 64d86d 101348 64d87d RtlLeaveCriticalSection _doexit 101254->101348 101256 6487d5 __calloc_crt 58 API calls 101256->101259 101257 64d7f2 GetStdHandle 101257->101260 101258 64d805 GetFileType 101258->101260 101259->101256 101259->101260 101261 64d6c4 101259->101261 101260->101254 101260->101257 101260->101258 101347 649e2b InitializeCriticalSectionAndSpinCount 101260->101347 101261->101260 101262 64d6f8 GetFileType 101261->101262 101346 649e2b InitializeCriticalSectionAndSpinCount 101261->101346 101262->101261 101266 654f34 101265->101266 101267 647d06 101265->101267 101388 64881d 58 API calls 2 library calls 101266->101388 101271 654b1b GetModuleFileNameW 101267->101271 101269 654f5a _memmove 101270 654f70 FreeEnvironmentStringsW 101269->101270 101270->101267 101272 654b4f _wparse_cmdline 101271->101272 101274 654b8f _wparse_cmdline 101272->101274 101389 64881d 58 API calls 2 library calls 101272->101389 101274->101205 101276 654d71 __wsetenvp 101275->101276 101277 654d69 101275->101277 101278 6487d5 __calloc_crt 58 API calls 101276->101278 101277->101209 101282 654d9a __wsetenvp 101278->101282 101279 654df1 101280 642d55 _free 58 API calls 101279->101280 101280->101277 101281 6487d5 __calloc_crt 58 API calls 101281->101282 101282->101277 101282->101279 101282->101281 101283 654e16 101282->101283 101286 654e2d 101282->101286 101390 654607 58 API calls __cftog_l 101282->101390 101284 642d55 _free 58 API calls 101283->101284 101284->101277 101391 648dc6 IsProcessorFeaturePresent 101286->101391 101288 654e39 101288->101209 101290 6430fb __IsNonwritableInCurrentImage 101289->101290 101414 64a4d1 101290->101414 101292 643119 __initterm_e 101294 643138 _doexit __IsNonwritableInCurrentImage 101292->101294 101417 642d40 101292->101417 101294->101213 101296 6247ea 101295->101296 101306 624889 101295->101306 101297 624824 74D2C8D0 101296->101297 101452 64336c 101297->101452 101301 624850 101464 6248fd SystemParametersInfoW SystemParametersInfoW 101301->101464 101303 62485c 101465 623b3a 101303->101465 101305 624864 SystemParametersInfoW 101305->101306 101306->101217 101307->101191 101308->101195 101309->101202 101313->101218 101314->101221 101315->101227 101316->101229 101317->101233 101318->101234 101321 6487dc 101319->101321 101322 648817 101321->101322 101324 6487fa 101321->101324 101328 6551f6 101321->101328 101322->101238 101325 649de6 TlsSetValue 101322->101325 101324->101321 101324->101322 101336 64a132 Sleep 101324->101336 101325->101242 101326->101245 101327->101241 101329 655201 101328->101329 101333 65521c 101328->101333 101330 65520d 101329->101330 101329->101333 101337 648b28 58 API calls __getptd_noexit 101330->101337 101332 65522c RtlAllocateHeap 101332->101333 101334 655212 101332->101334 101333->101332 101333->101334 101338 6433a1 RtlDecodePointer 101333->101338 101334->101321 101336->101324 101337->101334 101338->101333 101340 649c1c 101339->101340 101341 649c2f RtlEnterCriticalSection 101339->101341 101349 649c93 101340->101349 101341->101249 101343 649c22 101343->101341 101373 6430b5 58 API calls 3 library calls 101343->101373 101346->101261 101347->101260 101348->101253 101350 649c9f __getstream 101349->101350 101351 649cc0 101350->101351 101352 649ca8 101350->101352 101361 649ce1 __getstream 101351->101361 101377 64881d 58 API calls 2 library calls 101351->101377 101374 64a16b 58 API calls __NMSG_WRITE 101352->101374 101354 649cad 101375 64a1c8 58 API calls 6 library calls 101354->101375 101357 649cd5 101359 649cdc 101357->101359 101360 649ceb 101357->101360 101358 649cb4 101376 64309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101358->101376 101378 648b28 58 API calls __getptd_noexit 101359->101378 101362 649c0b __lock 58 API calls 101360->101362 101361->101343 101365 649cf2 101362->101365 101367 649d17 101365->101367 101368 649cff 101365->101368 101380 642d55 101367->101380 101379 649e2b InitializeCriticalSectionAndSpinCount 101368->101379 101371 649d0b 101386 649d33 RtlLeaveCriticalSection _doexit 101371->101386 101374->101354 101375->101358 101377->101357 101378->101361 101379->101371 101381 642d5e RtlFreeHeap 101380->101381 101382 642d87 _free 101380->101382 101381->101382 101383 642d73 101381->101383 101382->101371 101387 648b28 58 API calls __getptd_noexit 101383->101387 101385 642d79 GetLastError 101385->101382 101386->101361 101387->101385 101388->101269 101389->101274 101390->101282 101392 648dd1 101391->101392 101397 648c59 101392->101397 101396 648dec 101396->101288 101398 648c73 _memset __call_reportfault 101397->101398 101399 648c93 IsDebuggerPresent 101398->101399 101405 64a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101399->101405 101402 648d57 __call_reportfault 101406 64c5f6 101402->101406 101403 648d7a 101404 64a140 GetCurrentProcess TerminateProcess 101403->101404 101404->101396 101405->101402 101407 64c600 IsProcessorFeaturePresent 101406->101407 101408 64c5fe 101406->101408 101410 65590a 101407->101410 101408->101403 101413 6558b9 5 API calls 2 library calls 101410->101413 101412 6559ed 101412->101403 101413->101412 101415 64a4d4 RtlEncodePointer 101414->101415 101415->101415 101416 64a4ee 101415->101416 101416->101292 101420 642c44 101417->101420 101419 642d4b 101419->101294 101421 642c50 __getstream 101420->101421 101428 643217 101421->101428 101427 642c77 __getstream 101427->101419 101429 649c0b __lock 58 API calls 101428->101429 101430 642c59 101429->101430 101431 642c88 RtlDecodePointer RtlDecodePointer 101430->101431 101432 642cb5 101431->101432 101433 642c65 101431->101433 101432->101433 101445 6487a4 59 API calls __cftog_l 101432->101445 101442 642c82 101433->101442 101435 642d18 RtlEncodePointer RtlEncodePointer 101435->101433 101436 642cc7 101436->101435 101437 642cec 101436->101437 101446 648864 61 API calls 2 library calls 101436->101446 101437->101433 101440 642d06 RtlEncodePointer 101437->101440 101447 648864 61 API calls 2 library calls 101437->101447 101440->101435 101441 642d00 101441->101433 101441->101440 101448 643220 101442->101448 101445->101436 101446->101437 101447->101441 101451 649d75 RtlLeaveCriticalSection 101448->101451 101450 642c87 101450->101427 101451->101450 101453 649c0b __lock 58 API calls 101452->101453 101454 643377 RtlDecodePointer RtlEncodePointer 101453->101454 101517 649d75 RtlLeaveCriticalSection 101454->101517 101456 624849 101457 6433d4 101456->101457 101458 6433de 101457->101458 101459 6433f8 101457->101459 101458->101459 101518 648b28 58 API calls __getptd_noexit 101458->101518 101459->101301 101461 6433e8 101519 648db6 9 API calls __cftog_l 101461->101519 101463 6433f3 101463->101301 101464->101303 101466 623b47 __ftell_nolock 101465->101466 101520 627667 101466->101520 101470 623b7a IsDebuggerPresent 101471 65d272 MessageBoxA 101470->101471 101472 623b88 101470->101472 101475 65d28c 101471->101475 101473 623c61 101472->101473 101474 623ba5 101472->101474 101472->101475 101476 623c68 SetCurrentDirectoryW 101473->101476 101606 627285 101474->101606 101724 627213 59 API calls Mailbox 101475->101724 101479 623c75 Mailbox 101476->101479 101479->101305 101480 65d29c 101485 65d2b2 SetCurrentDirectoryW 101480->101485 101482 623bc3 GetFullPathNameW 101483 627bcc 59 API calls 101482->101483 101484 623bfe 101483->101484 101622 63092d 101484->101622 101485->101479 101488 623c1c 101489 623c26 101488->101489 101725 67874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101488->101725 101638 623a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101489->101638 101492 65d2cf 101492->101489 101495 65d2e0 101492->101495 101726 624706 101495->101726 101496 623c30 101498 623c43 101496->101498 101501 62434a 68 API calls 101496->101501 101646 6309d0 101498->101646 101500 65d2e8 101733 627de1 101500->101733 101501->101498 101502 623c4e 101502->101473 101723 62443a Shell_NotifyIconW _memset 101502->101723 101504 65d2f5 101506 65d324 101504->101506 101507 65d2ff 101504->101507 101517->101456 101518->101461 101519->101463 101521 640db6 Mailbox 59 API calls 101520->101521 101522 627688 101521->101522 101523 640db6 Mailbox 59 API calls 101522->101523 101524 623b51 GetCurrentDirectoryW 101523->101524 101525 623766 101524->101525 101526 627667 59 API calls 101525->101526 101527 62377c 101526->101527 101737 623d31 101527->101737 101529 62379a 101530 624706 61 API calls 101529->101530 101531 6237ae 101530->101531 101532 627de1 59 API calls 101531->101532 101533 6237bb 101532->101533 101751 624ddd 101533->101751 101536 65d173 101818 68955b 101536->101818 101537 6237dc Mailbox 101541 628047 59 API calls 101537->101541 101540 65d192 101543 642d55 _free 58 API calls 101540->101543 101544 6237ef 101541->101544 101545 65d19f 101543->101545 101775 62928a 101544->101775 101547 624e4a 84 API calls 101545->101547 101549 65d1a8 101547->101549 101553 623ed0 59 API calls 101549->101553 101550 627de1 59 API calls 101551 623808 101550->101551 101778 6284c0 101551->101778 101555 65d1c3 101553->101555 101554 62381a Mailbox 101556 627de1 59 API calls 101554->101556 101558 623ed0 59 API calls 101555->101558 101557 623840 101556->101557 101560 6284c0 69 API calls 101557->101560 101559 65d1df 101558->101559 101561 624706 61 API calls 101559->101561 101563 62384f Mailbox 101560->101563 101562 65d204 101561->101562 101564 623ed0 59 API calls 101562->101564 101566 627667 59 API calls 101563->101566 101565 65d210 101564->101565 101567 628047 59 API calls 101565->101567 101568 62386d 101566->101568 101569 65d21e 101567->101569 101782 623ed0 101568->101782 101571 623ed0 59 API calls 101569->101571 101573 65d22d 101571->101573 101580 628047 59 API calls 101573->101580 101575 623887 101575->101549 101576 623891 101575->101576 101577 642efd _W_store_winword 60 API calls 101576->101577 101578 62389c 101577->101578 101578->101555 101579 6238a6 101578->101579 101582 642efd _W_store_winword 60 API calls 101579->101582 101581 65d24f 101580->101581 101583 623ed0 59 API calls 101581->101583 101584 6238b1 101582->101584 101585 65d25c 101583->101585 101584->101559 101586 6238bb 101584->101586 101585->101585 101587 642efd _W_store_winword 60 API calls 101586->101587 101588 6238c6 101587->101588 101588->101573 101589 623907 101588->101589 101591 623ed0 59 API calls 101588->101591 101589->101573 101590 623914 101589->101590 101798 6292ce 101590->101798 101593 6238ea 101591->101593 101595 628047 59 API calls 101593->101595 101597 6238f8 101595->101597 101599 623ed0 59 API calls 101597->101599 101599->101589 101601 62928a 59 API calls 101602 62394f 101601->101602 101602->101601 101603 628ee0 60 API calls 101602->101603 101604 623ed0 59 API calls 101602->101604 101605 623995 Mailbox 101602->101605 101603->101602 101604->101602 101605->101470 101607 627292 __ftell_nolock 101606->101607 101608 6272ab 101607->101608 101610 65ea22 _memset 101607->101610 102682 624750 101608->102682 101612 65ea3e 7574D0D0 101610->101612 101614 65ea8d 101612->101614 101615 627bcc 59 API calls 101614->101615 101617 65eaa2 101615->101617 101617->101617 101619 6272c9 102710 62686a 101619->102710 101623 63093a __ftell_nolock 101622->101623 102962 626d80 101623->102962 101625 63093f 101626 623c14 101625->101626 102973 63119e 90 API calls 101625->102973 101626->101480 101626->101488 101628 63094c 101628->101626 102974 633ee7 92 API calls Mailbox 101628->102974 101630 630955 101630->101626 101631 630959 GetFullPathNameW 101630->101631 101632 627bcc 59 API calls 101631->101632 101633 630985 101632->101633 101634 627bcc 59 API calls 101633->101634 101635 630992 101634->101635 101636 664cab _wcscat 101635->101636 101637 627bcc 59 API calls 101635->101637 101637->101626 101639 623ab0 LoadImageW RegisterClassExW 101638->101639 101640 65d261 101638->101640 103011 623041 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 101639->103011 103015 6247a0 LoadImageW EnumResourceNamesW 101640->103015 101644 65d26a 101645 6239d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101645->101496 101647 664cc3 101646->101647 101658 6309f5 101646->101658 103151 689e4a 90 API calls 4 library calls 101647->103151 101649 630cfa 101649->101502 101651 630ee4 101651->101649 101653 630ef1 101651->101653 103149 631093 332 API calls Mailbox 101653->103149 101654 630a4b PeekMessageW 101721 630a05 Mailbox 101654->101721 101658->101721 103152 629e5d 60 API calls 101658->103152 103153 676349 332 API calls 101658->103153 101659 664e81 Sleep 101659->101721 101661 630ce4 101661->101649 103148 631070 10 API calls Mailbox 101661->103148 101665 630e43 PeekMessageW 101665->101721 101666 630ea5 TranslateMessage DispatchMessageW 101666->101665 101667 664d50 TranslateAcceleratorW 101667->101665 101667->101721 101668 629e5d 60 API calls 101668->101721 101669 630d13 timeGetTime 101669->101721 101670 66581f WaitForSingleObject 101673 66583c GetExitCodeProcess CloseHandle 101670->101673 101670->101721 101672 640db6 59 API calls Mailbox 101672->101721 101704 630f95 101673->101704 101674 630e5f Sleep 101706 630e70 Mailbox 101674->101706 101675 628047 59 API calls 101675->101721 101676 627667 59 API calls 101676->101706 101677 665af8 Sleep 101677->101706 101680 64049f timeGetTime 101680->101706 101681 630f4e timeGetTime 103150 629e5d 60 API calls 101681->103150 101684 665b8f GetExitCodeProcess 101688 665ba5 WaitForSingleObject 101684->101688 101689 665bbb CloseHandle 101684->101689 101686 6a5f25 111 API calls 101686->101706 101687 62b7dd 110 API calls 101687->101706 101688->101689 101688->101721 101689->101706 101692 665874 101692->101704 101693 665078 Sleep 101693->101721 101694 665c17 Sleep 101694->101721 101696 627de1 59 API calls 101696->101706 101704->101502 101706->101676 101706->101680 101706->101684 101706->101686 101706->101687 101706->101692 101706->101693 101706->101694 101706->101696 101706->101704 101706->101721 103178 682408 60 API calls 101706->103178 103179 629e5d 60 API calls 101706->103179 103180 6289b3 69 API calls Mailbox 101706->103180 103181 62b73c 332 API calls 101706->103181 103182 6764da 60 API calls 101706->103182 103183 685244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101706->103183 103184 683c55 66 API calls Mailbox 101706->103184 101708 689e4a 90 API calls 101708->101721 101709 629c90 59 API calls Mailbox 101709->101721 101710 629ea0 305 API calls 101710->101721 101711 6284c0 69 API calls 101711->101721 101713 67617e 59 API calls Mailbox 101713->101721 101714 6289b3 69 API calls 101714->101721 101715 6655d5 VariantClear 101715->101721 101716 66566b VariantClear 101716->101721 101717 665419 VariantClear 101717->101721 101718 628cd4 59 API calls Mailbox 101718->101721 101719 676e8f 59 API calls 101719->101721 101720 627de1 59 API calls 101720->101721 101721->101654 101721->101659 101721->101661 101721->101665 101721->101666 101721->101667 101721->101668 101721->101669 101721->101670 101721->101672 101721->101674 101721->101675 101721->101677 101721->101681 101721->101704 101721->101706 101721->101708 101721->101709 101721->101710 101721->101711 101721->101713 101721->101714 101721->101715 101721->101716 101721->101717 101721->101718 101721->101719 101721->101720 101722 62b73c 305 API calls 101721->101722 103016 62e6a0 101721->103016 103047 62f460 101721->103047 103066 62fce0 101721->103066 103146 62e420 332 API calls 101721->103146 103147 6231ce IsDialogMessageW GetClassLongW 101721->103147 103154 6a6018 59 API calls 101721->103154 103155 689a15 59 API calls Mailbox 101721->103155 103156 67d4f2 59 API calls 101721->103156 103157 629837 101721->103157 103175 6760ef 59 API calls 2 library calls 101721->103175 103176 628401 59 API calls 101721->103176 103177 6282df 59 API calls Mailbox 101721->103177 101722->101721 101723->101473 101724->101480 101725->101492 101727 651940 __ftell_nolock 101726->101727 101728 624713 GetModuleFileNameW 101727->101728 101729 627de1 59 API calls 101728->101729 101730 624739 101729->101730 101731 624750 60 API calls 101730->101731 101732 624743 Mailbox 101731->101732 101732->101500 101734 627df0 __wsetenvp _memmove 101733->101734 101735 640db6 Mailbox 59 API calls 101734->101735 101736 627e2e 101735->101736 101736->101504 101738 623d3e __ftell_nolock 101737->101738 101739 627bcc 59 API calls 101738->101739 101745 623ea4 Mailbox 101738->101745 101741 623d70 101739->101741 101750 623da6 Mailbox 101741->101750 101859 6279f2 101741->101859 101742 6279f2 59 API calls 101742->101750 101743 623e77 101744 627de1 59 API calls 101743->101744 101743->101745 101747 623e98 101744->101747 101745->101529 101746 627de1 59 API calls 101746->101750 101748 623f74 59 API calls 101747->101748 101748->101745 101750->101742 101750->101743 101750->101745 101750->101746 101862 623f74 101750->101862 101868 624bb5 101751->101868 101756 65d8e6 101758 624e4a 84 API calls 101756->101758 101757 624e08 LoadLibraryExW 101878 624b6a 101757->101878 101760 65d8ed 101758->101760 101762 624b6a 3 API calls 101760->101762 101765 65d8f5 101762->101765 101764 624e2f 101764->101765 101766 624e3b 101764->101766 101904 624f0b 101765->101904 101767 624e4a 84 API calls 101766->101767 101769 6237d4 101767->101769 101769->101536 101769->101537 101772 65d91c 101912 624ec7 101772->101912 101774 65d929 101776 640db6 Mailbox 59 API calls 101775->101776 101777 6237fb 101776->101777 101777->101550 101779 6284cb 101778->101779 101780 6284f2 101779->101780 102341 6289b3 69 API calls Mailbox 101779->102341 101780->101554 101783 623ef3 101782->101783 101784 623eda 101782->101784 101786 627bcc 59 API calls 101783->101786 101785 628047 59 API calls 101784->101785 101787 623879 101785->101787 101786->101787 101788 642efd 101787->101788 101789 642f7e 101788->101789 101790 642f09 101788->101790 102344 642f90 60 API calls 3 library calls 101789->102344 101794 642f2e 101790->101794 102342 648b28 58 API calls __getptd_noexit 101790->102342 101793 642f8b 101793->101575 101794->101575 101795 642f15 102343 648db6 9 API calls __cftog_l 101795->102343 101797 642f20 101797->101575 101799 6292d6 101798->101799 101800 640db6 Mailbox 59 API calls 101799->101800 101801 6292e4 101800->101801 101802 623924 101801->101802 102345 6291fc 59 API calls Mailbox 101801->102345 101804 629050 101802->101804 102346 629160 101804->102346 101806 640db6 Mailbox 59 API calls 101807 623932 101806->101807 101809 628ee0 101807->101809 101808 62905f 101808->101806 101808->101807 101810 65f17c 101809->101810 101816 628ef7 101809->101816 101810->101816 102356 628bdb 59 API calls Mailbox 101810->102356 101812 629040 102355 629d3c 60 API calls Mailbox 101812->102355 101813 628ff8 101814 640db6 Mailbox 59 API calls 101813->101814 101817 628fff 101814->101817 101816->101812 101816->101813 101816->101817 101817->101602 101819 624ee5 85 API calls 101818->101819 101820 6895ca 101819->101820 102357 689734 101820->102357 101823 624f0b 74 API calls 101824 6895f7 101823->101824 101825 624f0b 74 API calls 101824->101825 101826 689607 101825->101826 101827 624f0b 74 API calls 101826->101827 101828 689622 101827->101828 101829 624f0b 74 API calls 101828->101829 101830 68963d 101829->101830 101831 624ee5 85 API calls 101830->101831 101832 689654 101831->101832 101833 64571c __malloc_crt 58 API calls 101832->101833 101834 68965b 101833->101834 101835 64571c __malloc_crt 58 API calls 101834->101835 101836 689665 101835->101836 101837 624f0b 74 API calls 101836->101837 101838 689679 101837->101838 101839 689109 GetSystemTimeAsFileTime 101838->101839 101840 68968c 101839->101840 101841 6896a1 101840->101841 101842 6896b6 101840->101842 101843 642d55 _free 58 API calls 101841->101843 101844 68971b 101842->101844 101845 6896bc 101842->101845 101847 6896a7 101843->101847 101846 642d55 _free 58 API calls 101844->101846 102363 688b06 101845->102363 101852 65d186 101846->101852 101849 642d55 _free 58 API calls 101847->101849 101849->101852 101851 642d55 _free 58 API calls 101851->101852 101852->101540 101853 624e4a 101852->101853 101854 624e54 101853->101854 101855 624e5b 101853->101855 101856 6453a6 __fcloseall 83 API calls 101854->101856 101857 624e6a 101855->101857 101858 624e7b FreeLibrary 101855->101858 101856->101855 101857->101540 101858->101857 101860 627e4f 59 API calls 101859->101860 101861 6279fd 101860->101861 101861->101741 101863 623f82 101862->101863 101867 623fa4 _memmove 101862->101867 101866 640db6 Mailbox 59 API calls 101863->101866 101864 640db6 Mailbox 59 API calls 101865 623fb8 101864->101865 101865->101750 101866->101867 101867->101864 101917 624c03 101868->101917 101871 624bdc 101873 624bf5 101871->101873 101874 624bec FreeLibrary 101871->101874 101872 624c03 2 API calls 101872->101871 101875 64525b 101873->101875 101874->101873 101921 645270 101875->101921 101877 624dfc 101877->101756 101877->101757 102078 624c36 101878->102078 101881 624b8f 101883 624ba1 FreeLibrary 101881->101883 101884 624baa 101881->101884 101882 624c36 2 API calls 101882->101881 101883->101884 101885 624c70 101884->101885 101886 640db6 Mailbox 59 API calls 101885->101886 101887 624c85 101886->101887 102082 62522e 101887->102082 101889 624c91 _memmove 101890 624ccc 101889->101890 101891 624dc1 101889->101891 101892 624d89 101889->101892 101893 624ec7 69 API calls 101890->101893 102096 68991b 95 API calls 101891->102096 102085 624e89 CreateStreamOnHGlobal 101892->102085 101901 624cd5 101893->101901 101896 624f0b 74 API calls 101896->101901 101897 624d69 101897->101764 101899 65d8a7 101900 624ee5 85 API calls 101899->101900 101902 65d8bb 101900->101902 101901->101896 101901->101897 101901->101899 102091 624ee5 101901->102091 101903 624f0b 74 API calls 101902->101903 101903->101897 101905 65d9cd 101904->101905 101906 624f1d 101904->101906 102120 6455e2 101906->102120 101909 689109 102318 688f5f 101909->102318 101911 68911f 101911->101772 101913 624ed6 101912->101913 101914 65d990 101912->101914 102323 645c60 101913->102323 101916 624ede 101916->101774 101918 624bd0 101917->101918 101919 624c0c LoadLibraryA 101917->101919 101918->101871 101918->101872 101919->101918 101920 624c1d GetProcAddress 101919->101920 101920->101918 101923 64527c __getstream 101921->101923 101922 64528f 101970 648b28 58 API calls __getptd_noexit 101922->101970 101923->101922 101925 6452c0 101923->101925 101940 6504e8 101925->101940 101926 645294 101971 648db6 9 API calls __cftog_l 101926->101971 101929 6452c5 101930 6452ce 101929->101930 101931 6452db 101929->101931 101972 648b28 58 API calls __getptd_noexit 101930->101972 101934 645305 101931->101934 101935 6452e5 101931->101935 101932 64529f @_EH4_CallFilterFunc@8 __getstream 101932->101877 101955 650607 101934->101955 101973 648b28 58 API calls __getptd_noexit 101935->101973 101941 6504f4 __getstream 101940->101941 101942 649c0b __lock 58 API calls 101941->101942 101953 650502 101942->101953 101943 650576 101975 6505fe 101943->101975 101944 65057d 101980 64881d 58 API calls 2 library calls 101944->101980 101947 6505f3 __getstream 101947->101929 101948 650584 101948->101943 101981 649e2b InitializeCriticalSectionAndSpinCount 101948->101981 101949 649c93 __mtinitlocknum 58 API calls 101949->101953 101952 6505aa RtlEnterCriticalSection 101952->101943 101953->101943 101953->101944 101953->101949 101978 646c50 59 API calls __lock 101953->101978 101979 646cba RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 101953->101979 101964 650627 __wopenfile 101955->101964 101956 650641 101986 648b28 58 API calls __getptd_noexit 101956->101986 101957 6507fc 101957->101956 101962 65085f 101957->101962 101959 650646 101987 648db6 9 API calls __cftog_l 101959->101987 101961 645310 101974 645332 RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 101961->101974 101983 6585a1 101962->101983 101964->101956 101964->101957 101988 6437cb 60 API calls 2 library calls 101964->101988 101966 6507f5 101966->101957 101989 6437cb 60 API calls 2 library calls 101966->101989 101968 650814 101968->101957 101990 6437cb 60 API calls 2 library calls 101968->101990 101970->101926 101971->101932 101972->101932 101973->101932 101974->101932 101982 649d75 RtlLeaveCriticalSection 101975->101982 101977 650605 101977->101947 101978->101953 101979->101953 101980->101948 101981->101952 101982->101977 101991 657d85 101983->101991 101985 6585ba 101985->101961 101986->101959 101987->101961 101988->101966 101989->101968 101990->101957 101992 657d91 __getstream 101991->101992 101993 657da7 101992->101993 101996 657ddd 101992->101996 102075 648b28 58 API calls __getptd_noexit 101993->102075 101995 657dac 102076 648db6 9 API calls __cftog_l 101995->102076 102002 657e4e 101996->102002 101999 657df9 102077 657e22 RtlLeaveCriticalSection __unlock_fhandle 101999->102077 102001 657db6 __getstream 102001->101985 102003 657e6e 102002->102003 102004 6444ea __wsopen_nolock 58 API calls 102003->102004 102007 657e8a 102004->102007 102005 648dc6 __invoke_watson 8 API calls 102006 6585a0 102005->102006 102008 657d85 __wsopen_helper 103 API calls 102006->102008 102009 657ec4 102007->102009 102015 657ee7 102007->102015 102074 657fc1 102007->102074 102010 6585ba 102008->102010 102011 648af4 __chsize_nolock 58 API calls 102009->102011 102010->101999 102012 657ec9 102011->102012 102013 648b28 __cftog_l 58 API calls 102012->102013 102014 657ed6 102013->102014 102017 648db6 __cftog_l 9 API calls 102014->102017 102016 657fa5 102015->102016 102024 657f83 102015->102024 102018 648af4 __chsize_nolock 58 API calls 102016->102018 102019 657ee0 102017->102019 102020 657faa 102018->102020 102019->101999 102021 648b28 __cftog_l 58 API calls 102020->102021 102022 657fb7 102021->102022 102023 648db6 __cftog_l 9 API calls 102022->102023 102023->102074 102025 64d294 __alloc_osfhnd 61 API calls 102024->102025 102026 658051 102025->102026 102027 65807e 102026->102027 102028 65805b 102026->102028 102029 657cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102027->102029 102030 648af4 __chsize_nolock 58 API calls 102028->102030 102039 6580a0 102029->102039 102031 658060 102030->102031 102033 648b28 __cftog_l 58 API calls 102031->102033 102032 65811e GetFileType 102034 658129 GetLastError 102032->102034 102035 65816b 102032->102035 102037 65806a 102033->102037 102038 648b07 __dosmaperr 58 API calls 102034->102038 102047 64d52a __set_osfhnd 59 API calls 102035->102047 102036 6580ec GetLastError 102040 648b07 __dosmaperr 58 API calls 102036->102040 102041 648b28 __cftog_l 58 API calls 102037->102041 102042 658150 CloseHandle 102038->102042 102039->102032 102039->102036 102043 657cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102039->102043 102044 658111 102040->102044 102041->102019 102042->102044 102045 65815e 102042->102045 102046 6580e1 102043->102046 102049 648b28 __cftog_l 58 API calls 102044->102049 102048 648b28 __cftog_l 58 API calls 102045->102048 102046->102032 102046->102036 102051 658189 102047->102051 102050 658163 102048->102050 102049->102074 102050->102044 102052 6518c1 __lseeki64_nolock 60 API calls 102051->102052 102053 658344 102051->102053 102057 65820a 102051->102057 102054 6581f3 102052->102054 102055 658517 CloseHandle 102053->102055 102053->102074 102054->102057 102059 648af4 __chsize_nolock 58 API calls 102054->102059 102056 657cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102055->102056 102058 65853e 102056->102058 102057->102053 102060 650e5b 70 API calls __read_nolock 102057->102060 102064 650add __close_nolock 61 API calls 102057->102064 102066 6597a2 __chsize_nolock 82 API calls 102057->102066 102068 6518c1 60 API calls __lseeki64_nolock 102057->102068 102069 64d886 __write 78 API calls 102057->102069 102070 6583c1 102057->102070 102061 658546 GetLastError 102058->102061 102067 658572 102058->102067 102059->102057 102060->102057 102062 648b07 __dosmaperr 58 API calls 102061->102062 102063 658552 102062->102063 102065 64d43d __free_osfhnd 59 API calls 102063->102065 102064->102057 102065->102067 102066->102057 102067->102074 102068->102057 102069->102057 102071 650add __close_nolock 61 API calls 102070->102071 102072 6583c8 102071->102072 102073 648b28 __cftog_l 58 API calls 102072->102073 102073->102074 102074->102005 102075->101995 102076->102001 102077->102001 102079 624b83 102078->102079 102080 624c3f LoadLibraryA 102078->102080 102079->101881 102079->101882 102080->102079 102081 624c50 GetProcAddress 102080->102081 102081->102079 102083 640db6 Mailbox 59 API calls 102082->102083 102084 625240 102083->102084 102084->101889 102086 624ea3 FindResourceExW 102085->102086 102090 624ec0 102085->102090 102087 65d933 LoadResource 102086->102087 102086->102090 102088 65d948 SizeofResource 102087->102088 102087->102090 102089 65d95c LockResource 102088->102089 102088->102090 102089->102090 102090->101890 102092 624ef4 102091->102092 102093 65d9ab 102091->102093 102097 64584d 102092->102097 102095 624f02 102095->101901 102096->101890 102098 645859 __getstream 102097->102098 102099 64586b 102098->102099 102101 645891 102098->102101 102110 648b28 58 API calls __getptd_noexit 102099->102110 102112 646c11 102101->102112 102102 645870 102111 648db6 9 API calls __cftog_l 102102->102111 102105 645897 102118 6457be 83 API calls 5 library calls 102105->102118 102107 6458a6 102119 6458c8 RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 102107->102119 102109 64587b __getstream 102109->102095 102110->102102 102111->102109 102113 646c21 102112->102113 102114 646c43 RtlEnterCriticalSection 102112->102114 102113->102114 102116 646c29 102113->102116 102115 646c39 102114->102115 102115->102105 102117 649c0b __lock 58 API calls 102116->102117 102117->102115 102118->102107 102119->102109 102123 6455fd 102120->102123 102122 624f2e 102122->101909 102124 645609 __getstream 102123->102124 102125 64564c 102124->102125 102126 64561f _memset 102124->102126 102128 645644 __getstream 102124->102128 102127 646c11 __lock_file 59 API calls 102125->102127 102150 648b28 58 API calls __getptd_noexit 102126->102150 102129 645652 102127->102129 102128->102122 102136 64541d 102129->102136 102132 645639 102151 648db6 9 API calls __cftog_l 102132->102151 102140 645438 _memset 102136->102140 102143 645453 102136->102143 102137 645443 102248 648b28 58 API calls __getptd_noexit 102137->102248 102139 645448 102249 648db6 9 API calls __cftog_l 102139->102249 102140->102137 102140->102143 102145 645493 102140->102145 102152 645686 RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 102143->102152 102144 6455a4 _memset 102251 648b28 58 API calls __getptd_noexit 102144->102251 102145->102143 102145->102144 102153 6446e6 102145->102153 102160 650e5b 102145->102160 102228 650ba7 102145->102228 102250 650cc8 58 API calls 3 library calls 102145->102250 102150->102132 102151->102128 102152->102128 102154 644705 102153->102154 102155 6446f0 102153->102155 102154->102145 102252 648b28 58 API calls __getptd_noexit 102155->102252 102157 6446f5 102253 648db6 9 API calls __cftog_l 102157->102253 102159 644700 102159->102145 102161 650e93 102160->102161 102162 650e7c 102160->102162 102164 6515cb 102161->102164 102169 650ecd 102161->102169 102263 648af4 58 API calls __getptd_noexit 102162->102263 102279 648af4 58 API calls __getptd_noexit 102164->102279 102166 650e81 102264 648b28 58 API calls __getptd_noexit 102166->102264 102167 6515d0 102280 648b28 58 API calls __getptd_noexit 102167->102280 102171 650ed5 102169->102171 102177 650eec 102169->102177 102265 648af4 58 API calls __getptd_noexit 102171->102265 102172 650ee1 102281 648db6 9 API calls __cftog_l 102172->102281 102174 650eda 102266 648b28 58 API calls __getptd_noexit 102174->102266 102176 650f01 102267 648af4 58 API calls __getptd_noexit 102176->102267 102177->102176 102180 650f1b 102177->102180 102181 650f39 102177->102181 102208 650e88 102177->102208 102180->102176 102185 650f26 102180->102185 102268 64881d 58 API calls 2 library calls 102181->102268 102183 650f49 102186 650f51 102183->102186 102187 650f6c 102183->102187 102254 655c6b 102185->102254 102269 648b28 58 API calls __getptd_noexit 102186->102269 102271 6518c1 60 API calls 3 library calls 102187->102271 102188 65103a 102190 6510b3 ReadFile 102188->102190 102195 651050 GetConsoleMode 102188->102195 102193 6510d5 102190->102193 102194 651593 GetLastError 102190->102194 102192 650f56 102270 648af4 58 API calls __getptd_noexit 102192->102270 102193->102194 102201 6510a5 102193->102201 102197 651093 102194->102197 102198 6515a0 102194->102198 102199 651064 102195->102199 102200 6510b0 102195->102200 102210 651099 102197->102210 102272 648b07 58 API calls 3 library calls 102197->102272 102277 648b28 58 API calls __getptd_noexit 102198->102277 102199->102200 102203 65106a ReadConsoleW 102199->102203 102200->102190 102201->102210 102211 65110a 102201->102211 102212 651377 102201->102212 102203->102201 102206 65108d GetLastError 102203->102206 102205 6515a5 102278 648af4 58 API calls __getptd_noexit 102205->102278 102206->102197 102208->102145 102209 642d55 _free 58 API calls 102209->102208 102210->102208 102210->102209 102214 651176 ReadFile 102211->102214 102220 6511f7 102211->102220 102212->102210 102215 65147d ReadFile 102212->102215 102216 651197 GetLastError 102214->102216 102225 6511a1 102214->102225 102219 6514a0 GetLastError 102215->102219 102227 6514ae 102215->102227 102216->102225 102217 6512b4 102222 651264 MultiByteToWideChar 102217->102222 102275 6518c1 60 API calls 3 library calls 102217->102275 102218 6512a4 102274 648b28 58 API calls __getptd_noexit 102218->102274 102219->102227 102220->102210 102220->102217 102220->102218 102220->102222 102222->102206 102222->102210 102225->102211 102273 6518c1 60 API calls 3 library calls 102225->102273 102227->102212 102276 6518c1 60 API calls 3 library calls 102227->102276 102229 650bb2 102228->102229 102233 650bc7 102228->102233 102315 648b28 58 API calls __getptd_noexit 102229->102315 102231 650bb7 102316 648db6 9 API calls __cftog_l 102231->102316 102234 650bfc 102233->102234 102242 650bc2 102233->102242 102317 655fe4 58 API calls __malloc_crt 102233->102317 102236 6446e6 __fputwc_nolock 58 API calls 102234->102236 102237 650c10 102236->102237 102282 650d47 102237->102282 102239 650c17 102240 6446e6 __fputwc_nolock 58 API calls 102239->102240 102239->102242 102241 650c3a 102240->102241 102241->102242 102243 6446e6 __fputwc_nolock 58 API calls 102241->102243 102242->102145 102244 650c46 102243->102244 102244->102242 102245 6446e6 __fputwc_nolock 58 API calls 102244->102245 102246 650c53 102245->102246 102247 6446e6 __fputwc_nolock 58 API calls 102246->102247 102247->102242 102248->102139 102249->102143 102250->102145 102251->102139 102252->102157 102253->102159 102255 655c76 102254->102255 102256 655c83 102254->102256 102257 648b28 __cftog_l 58 API calls 102255->102257 102258 655c8f 102256->102258 102259 648b28 __cftog_l 58 API calls 102256->102259 102260 655c7b 102257->102260 102258->102188 102261 655cb0 102259->102261 102260->102188 102262 648db6 __cftog_l 9 API calls 102261->102262 102262->102260 102263->102166 102264->102208 102265->102174 102266->102172 102267->102174 102268->102183 102269->102192 102270->102208 102271->102185 102272->102210 102273->102225 102274->102210 102275->102222 102276->102227 102277->102205 102278->102210 102279->102167 102280->102172 102281->102208 102283 650d53 __getstream 102282->102283 102284 650d77 102283->102284 102285 650d60 102283->102285 102287 650e3b 102284->102287 102290 650d8b 102284->102290 102286 648af4 __chsize_nolock 58 API calls 102285->102286 102289 650d65 102286->102289 102288 648af4 __chsize_nolock 58 API calls 102287->102288 102291 650dae 102288->102291 102292 648b28 __cftog_l 58 API calls 102289->102292 102293 650db6 102290->102293 102294 650da9 102290->102294 102300 648b28 __cftog_l 58 API calls 102291->102300 102304 650d6c __getstream 102292->102304 102295 650dc3 102293->102295 102296 650dd8 102293->102296 102297 648af4 __chsize_nolock 58 API calls 102294->102297 102298 648af4 __chsize_nolock 58 API calls 102295->102298 102299 64d206 ___lock_fhandle 59 API calls 102296->102299 102297->102291 102301 650dc8 102298->102301 102302 650dde 102299->102302 102303 650dd0 102300->102303 102305 648b28 __cftog_l 58 API calls 102301->102305 102306 650e04 102302->102306 102307 650df1 102302->102307 102309 648db6 __cftog_l 9 API calls 102303->102309 102304->102239 102305->102303 102310 648b28 __cftog_l 58 API calls 102306->102310 102308 650e5b __read_nolock 70 API calls 102307->102308 102311 650dfd 102308->102311 102309->102304 102312 650e09 102310->102312 102314 650e33 __read RtlLeaveCriticalSection 102311->102314 102313 648af4 __chsize_nolock 58 API calls 102312->102313 102313->102311 102314->102304 102315->102231 102316->102242 102317->102234 102321 64520a GetSystemTimeAsFileTime 102318->102321 102320 688f6e 102320->101911 102322 645238 __aulldiv 102321->102322 102322->102320 102324 645c6c __getstream 102323->102324 102325 645c93 102324->102325 102326 645c7e 102324->102326 102328 646c11 __lock_file 59 API calls 102325->102328 102337 648b28 58 API calls __getptd_noexit 102326->102337 102330 645c99 102328->102330 102329 645c83 102338 648db6 9 API calls __cftog_l 102329->102338 102339 6458d0 67 API calls 5 library calls 102330->102339 102333 645ca4 102340 645cc4 RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 102333->102340 102335 645cb6 102336 645c8e __getstream 102335->102336 102336->101916 102337->102329 102338->102336 102339->102333 102340->102335 102341->101780 102342->101795 102343->101797 102344->101793 102345->101802 102347 629169 Mailbox 102346->102347 102348 65f19f 102347->102348 102353 629173 102347->102353 102349 640db6 Mailbox 59 API calls 102348->102349 102351 65f1ab 102349->102351 102350 62917a 102350->101808 102353->102350 102354 629c90 59 API calls Mailbox 102353->102354 102354->102353 102355->101817 102356->101816 102359 689748 __tzset_nolock _wcscmp 102357->102359 102358 689109 GetSystemTimeAsFileTime 102358->102359 102359->102358 102360 624f0b 74 API calls 102359->102360 102361 6895dc 102359->102361 102362 624ee5 85 API calls 102359->102362 102360->102359 102361->101823 102361->101852 102362->102359 102364 688b1f 102363->102364 102365 688b11 102363->102365 102367 688b64 102364->102367 102368 64525b 115 API calls 102364->102368 102393 688b28 102364->102393 102366 64525b 115 API calls 102365->102366 102366->102364 102394 688d91 102367->102394 102369 688b49 102368->102369 102369->102367 102371 688b52 102369->102371 102376 6453a6 __fcloseall 83 API calls 102371->102376 102371->102393 102372 688ba8 102373 688bac 102372->102373 102374 688bcd 102372->102374 102375 688bb9 102373->102375 102378 6453a6 __fcloseall 83 API calls 102373->102378 102398 6889a9 102374->102398 102380 6453a6 __fcloseall 83 API calls 102375->102380 102375->102393 102376->102393 102378->102375 102380->102393 102381 688bfb 102407 688c2b 102381->102407 102382 688bdb 102384 688be8 102382->102384 102386 6453a6 __fcloseall 83 API calls 102382->102386 102387 6453a6 __fcloseall 83 API calls 102384->102387 102384->102393 102386->102384 102387->102393 102390 688c16 102392 6453a6 __fcloseall 83 API calls 102390->102392 102390->102393 102392->102393 102393->101851 102395 688db6 102394->102395 102397 688d9f __tzset_nolock _memmove 102394->102397 102396 6455e2 __fread_nolock 74 API calls 102395->102396 102396->102397 102397->102372 102399 64571c __malloc_crt 58 API calls 102398->102399 102400 6889b8 102399->102400 102401 64571c __malloc_crt 58 API calls 102400->102401 102402 6889cc 102401->102402 102403 64571c __malloc_crt 58 API calls 102402->102403 102404 6889e0 102403->102404 102405 688d0d 58 API calls 102404->102405 102406 6889f3 102404->102406 102405->102406 102406->102381 102406->102382 102408 688c40 102407->102408 102409 688cf8 102408->102409 102411 688a05 74 API calls 102408->102411 102414 688c02 102408->102414 102436 688e12 102408->102436 102444 688aa1 74 API calls 102408->102444 102440 688f35 102409->102440 102411->102408 102415 688d0d 102414->102415 102416 688d1a 102415->102416 102420 688d20 102415->102420 102417 642d55 _free 58 API calls 102416->102417 102417->102420 102418 688d31 102419 688c09 102418->102419 102422 642d55 _free 58 API calls 102418->102422 102419->102390 102423 6453a6 102419->102423 102420->102418 102421 642d55 _free 58 API calls 102420->102421 102421->102418 102422->102419 102424 6453b2 __getstream 102423->102424 102425 6453c6 102424->102425 102426 6453de 102424->102426 102493 648b28 58 API calls __getptd_noexit 102425->102493 102429 646c11 __lock_file 59 API calls 102426->102429 102433 6453d6 __getstream 102426->102433 102428 6453cb 102494 648db6 9 API calls __cftog_l 102428->102494 102430 6453f0 102429->102430 102477 64533a 102430->102477 102433->102390 102437 688e21 102436->102437 102438 688e61 102436->102438 102437->102408 102438->102437 102445 688ee8 102438->102445 102441 688f42 102440->102441 102443 688f53 102440->102443 102442 644863 80 API calls 102441->102442 102442->102443 102443->102414 102444->102408 102446 688f25 102445->102446 102447 688f14 102445->102447 102446->102438 102449 644863 102447->102449 102450 64486f __getstream 102449->102450 102451 6448a5 102450->102451 102452 64488d 102450->102452 102455 64489d __getstream 102450->102455 102453 646c11 __lock_file 59 API calls 102451->102453 102474 648b28 58 API calls __getptd_noexit 102452->102474 102456 6448ab 102453->102456 102455->102446 102462 64470a 102456->102462 102457 644892 102475 648db6 9 API calls __cftog_l 102457->102475 102464 644719 102462->102464 102469 644737 102462->102469 102463 644727 102465 648b28 __cftog_l 58 API calls 102463->102465 102464->102463 102464->102469 102472 644751 _memmove 102464->102472 102466 64472c 102465->102466 102467 648db6 __cftog_l 9 API calls 102466->102467 102467->102469 102468 64ae1e __flsbuf 78 API calls 102468->102472 102476 6448dd RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 102469->102476 102470 644a3d __flush 78 API calls 102470->102472 102471 6446e6 __fputwc_nolock 58 API calls 102471->102472 102472->102468 102472->102469 102472->102470 102472->102471 102473 64d886 __write 78 API calls 102472->102473 102473->102472 102474->102457 102475->102455 102476->102455 102478 645349 102477->102478 102480 64535d 102477->102480 102532 648b28 58 API calls __getptd_noexit 102478->102532 102481 645359 102480->102481 102496 644a3d 102480->102496 102495 645415 RtlLeaveCriticalSection RtlLeaveCriticalSection __wfsopen 102481->102495 102482 64534e 102533 648db6 9 API calls __cftog_l 102482->102533 102488 6446e6 __fputwc_nolock 58 API calls 102489 645377 102488->102489 102506 650a02 102489->102506 102491 64537d 102491->102481 102492 642d55 _free 58 API calls 102491->102492 102492->102481 102493->102428 102494->102433 102495->102433 102497 644a50 102496->102497 102501 644a74 102496->102501 102498 6446e6 __fputwc_nolock 58 API calls 102497->102498 102497->102501 102499 644a6d 102498->102499 102534 64d886 102499->102534 102502 650b77 102501->102502 102503 645371 102502->102503 102504 650b84 102502->102504 102503->102488 102504->102503 102505 642d55 _free 58 API calls 102504->102505 102505->102503 102507 650a0e __getstream 102506->102507 102508 650a32 102507->102508 102509 650a1b 102507->102509 102511 650abd 102508->102511 102513 650a42 102508->102513 102659 648af4 58 API calls __getptd_noexit 102509->102659 102664 648af4 58 API calls __getptd_noexit 102511->102664 102512 650a20 102660 648b28 58 API calls __getptd_noexit 102512->102660 102516 650a60 102513->102516 102517 650a6a 102513->102517 102661 648af4 58 API calls __getptd_noexit 102516->102661 102521 64d206 ___lock_fhandle 59 API calls 102517->102521 102518 650a65 102665 648b28 58 API calls __getptd_noexit 102518->102665 102519 650a27 __getstream 102519->102491 102523 650a70 102521->102523 102525 650a83 102523->102525 102526 650a8e 102523->102526 102524 650ac9 102666 648db6 9 API calls __cftog_l 102524->102666 102644 650add 102525->102644 102662 648b28 58 API calls __getptd_noexit 102526->102662 102530 650a89 102663 650ab5 RtlLeaveCriticalSection __unlock_fhandle 102530->102663 102532->102482 102533->102481 102535 64d892 __getstream 102534->102535 102536 64d8b6 102535->102536 102537 64d89f 102535->102537 102538 64d955 102536->102538 102540 64d8ca 102536->102540 102635 648af4 58 API calls __getptd_noexit 102537->102635 102641 648af4 58 API calls __getptd_noexit 102538->102641 102543 64d8f2 102540->102543 102544 64d8e8 102540->102544 102542 64d8a4 102636 648b28 58 API calls __getptd_noexit 102542->102636 102562 64d206 102543->102562 102637 648af4 58 API calls __getptd_noexit 102544->102637 102545 64d8ed 102642 648b28 58 API calls __getptd_noexit 102545->102642 102549 64d8ab __getstream 102549->102501 102550 64d8f8 102552 64d91e 102550->102552 102553 64d90b 102550->102553 102638 648b28 58 API calls __getptd_noexit 102552->102638 102571 64d975 102553->102571 102554 64d961 102643 648db6 9 API calls __cftog_l 102554->102643 102558 64d917 102640 64d94d RtlLeaveCriticalSection __unlock_fhandle 102558->102640 102559 64d923 102639 648af4 58 API calls __getptd_noexit 102559->102639 102563 64d212 __getstream 102562->102563 102564 64d261 RtlEnterCriticalSection 102563->102564 102566 649c0b __lock 58 API calls 102563->102566 102565 64d287 __getstream 102564->102565 102565->102550 102567 64d237 102566->102567 102568 64d24f 102567->102568 102569 649e2b __getstream InitializeCriticalSectionAndSpinCount 102567->102569 102570 64d28b ___lock_fhandle RtlLeaveCriticalSection 102568->102570 102569->102568 102570->102564 102572 64d982 __ftell_nolock 102571->102572 102573 64d9e0 102572->102573 102574 64d9c1 102572->102574 102617 64d9b6 102572->102617 102577 64da38 102573->102577 102578 64da1c 102573->102578 102576 648af4 __chsize_nolock 58 API calls 102574->102576 102575 64c5f6 __cftog_l 6 API calls 102579 64e1d6 102575->102579 102580 64d9c6 102576->102580 102582 64da51 102577->102582 102586 6518c1 __lseeki64_nolock 60 API calls 102577->102586 102581 648af4 __chsize_nolock 58 API calls 102578->102581 102579->102558 102583 648b28 __cftog_l 58 API calls 102580->102583 102585 64da21 102581->102585 102584 655c6b __stbuf 58 API calls 102582->102584 102587 64d9cd 102583->102587 102588 64da5f 102584->102588 102589 648b28 __cftog_l 58 API calls 102585->102589 102586->102582 102590 648db6 __cftog_l 9 API calls 102587->102590 102591 64ddb8 102588->102591 102596 6499ac _LocaleUpdate::_LocaleUpdate 58 API calls 102588->102596 102592 64da28 102589->102592 102590->102617 102593 64ddd6 102591->102593 102594 64e14b WriteFile 102591->102594 102595 648db6 __cftog_l 9 API calls 102592->102595 102597 64defa 102593->102597 102601 64ddec 102593->102601 102598 64ddab GetLastError 102594->102598 102628 64dd78 102594->102628 102595->102617 102599 64da8b GetConsoleMode 102596->102599 102613 64dfef 102597->102613 102615 64df05 102597->102615 102598->102628 102599->102591 102600 64daca 102599->102600 102600->102591 102603 64dada GetConsoleCP 102600->102603 102602 64e184 102601->102602 102604 64de5b WriteFile 102601->102604 102605 648b28 __cftog_l 58 API calls 102602->102605 102602->102617 102603->102602 102630 64db09 102603->102630 102604->102598 102608 64de98 102604->102608 102606 64e1b2 102605->102606 102609 648af4 __chsize_nolock 58 API calls 102606->102609 102607 64ded8 102610 64dee3 102607->102610 102611 64e17b 102607->102611 102608->102601 102614 64debc 102608->102614 102609->102617 102619 648b28 __cftog_l 58 API calls 102610->102619 102620 648b07 __dosmaperr 58 API calls 102611->102620 102612 64e064 WideCharToMultiByte 102612->102598 102626 64e0ab 102612->102626 102613->102602 102613->102612 102614->102628 102615->102602 102616 64df6a WriteFile 102615->102616 102616->102598 102618 64dfb9 102616->102618 102617->102575 102618->102614 102618->102615 102618->102628 102621 64dee8 102619->102621 102620->102617 102623 648af4 __chsize_nolock 58 API calls 102621->102623 102622 64e0b3 WriteFile 102625 64e106 GetLastError 102622->102625 102622->102626 102623->102617 102624 6435f5 __write_nolock 58 API calls 102624->102630 102625->102626 102626->102613 102626->102614 102626->102622 102626->102628 102627 6562ba 60 API calls __write_nolock 102627->102630 102628->102602 102628->102607 102628->102617 102629 64dbf2 WideCharToMultiByte 102629->102628 102631 64dc2d WriteFile 102629->102631 102630->102624 102630->102627 102630->102628 102630->102629 102633 64dc5f 102630->102633 102631->102598 102631->102633 102632 657a5e WriteConsoleW CreateFileW __putwch_nolock 102632->102633 102633->102598 102633->102628 102633->102630 102633->102632 102634 64dc87 WriteFile 102633->102634 102634->102598 102634->102633 102635->102542 102636->102549 102637->102545 102638->102559 102639->102558 102640->102549 102641->102545 102642->102554 102643->102549 102667 64d4c3 102644->102667 102646 650b41 102680 64d43d 59 API calls 2 library calls 102646->102680 102647 650aeb 102647->102646 102650 64d4c3 __chsize_nolock 58 API calls 102647->102650 102658 650b1f 102647->102658 102649 650b49 102655 650b6b 102649->102655 102681 648b07 58 API calls 3 library calls 102649->102681 102652 650b16 102650->102652 102651 64d4c3 __chsize_nolock 58 API calls 102653 650b2b CloseHandle 102651->102653 102656 64d4c3 __chsize_nolock 58 API calls 102652->102656 102653->102646 102657 650b37 GetLastError 102653->102657 102655->102530 102656->102658 102657->102646 102658->102646 102658->102651 102659->102512 102660->102519 102661->102518 102662->102530 102663->102519 102664->102518 102665->102524 102666->102519 102668 64d4ce 102667->102668 102670 64d4e3 102667->102670 102669 648af4 __chsize_nolock 58 API calls 102668->102669 102672 64d4d3 102669->102672 102671 648af4 __chsize_nolock 58 API calls 102670->102671 102674 64d508 102670->102674 102675 64d512 102671->102675 102673 648b28 __cftog_l 58 API calls 102672->102673 102676 64d4db 102673->102676 102674->102647 102677 648b28 __cftog_l 58 API calls 102675->102677 102676->102647 102678 64d51a 102677->102678 102679 648db6 __cftog_l 9 API calls 102678->102679 102679->102676 102680->102649 102681->102655 102744 651940 102682->102744 102685 624799 102750 627d8c 102685->102750 102686 62477c 102688 627bcc 59 API calls 102686->102688 102689 624788 102688->102689 102746 627726 102689->102746 102692 640791 102693 651940 __ftell_nolock 102692->102693 102694 64079e GetLongPathNameW 102693->102694 102695 627bcc 59 API calls 102694->102695 102696 6272bd 102695->102696 102697 62700b 102696->102697 102698 627667 59 API calls 102697->102698 102699 62701d 102698->102699 102700 624750 60 API calls 102699->102700 102701 627028 102700->102701 102702 627033 102701->102702 102706 65e885 102701->102706 102703 623f74 59 API calls 102702->102703 102705 62703f 102703->102705 102754 6234c2 102705->102754 102707 65e89f 102706->102707 102760 627908 61 API calls 102706->102760 102709 627052 Mailbox 102709->101619 102711 624ddd 136 API calls 102710->102711 102712 62688f 102711->102712 102713 65e031 102712->102713 102715 624ddd 136 API calls 102712->102715 102714 68955b 122 API calls 102713->102714 102716 65e046 102714->102716 102717 6268a3 102715->102717 102718 65e067 102716->102718 102719 65e04a 102716->102719 102717->102713 102720 6268ab 102717->102720 102722 640db6 Mailbox 59 API calls 102718->102722 102721 624e4a 84 API calls 102719->102721 102723 6268b7 102720->102723 102724 65e052 102720->102724 102721->102724 102741 65e0ac Mailbox 102722->102741 102761 626a8c 102723->102761 102854 6842f8 91 API calls _wprintf 102724->102854 102728 65e060 102728->102718 102729 65e260 102730 642d55 _free 58 API calls 102729->102730 102731 65e268 102730->102731 102732 624e4a 84 API calls 102731->102732 102737 65e271 102732->102737 102736 642d55 _free 58 API calls 102736->102737 102737->102736 102738 624e4a 84 API calls 102737->102738 102860 67f7a1 90 API calls 4 library calls 102737->102860 102738->102737 102740 627de1 59 API calls 102740->102741 102741->102729 102741->102737 102741->102740 102855 67f73d 59 API calls 2 library calls 102741->102855 102856 67f65e 61 API calls 2 library calls 102741->102856 102857 68737f 59 API calls Mailbox 102741->102857 102858 62750f 59 API calls 2 library calls 102741->102858 102859 62735d 59 API calls Mailbox 102741->102859 102745 62475d GetFullPathNameW 102744->102745 102745->102685 102745->102686 102747 627734 102746->102747 102748 627d2c 59 API calls 102747->102748 102749 624794 102748->102749 102749->102692 102751 627da6 102750->102751 102753 627d99 102750->102753 102752 640db6 Mailbox 59 API calls 102751->102752 102752->102753 102753->102689 102755 6234f3 _memmove 102754->102755 102756 6234d4 102754->102756 102757 640db6 Mailbox 59 API calls 102755->102757 102758 640db6 Mailbox 59 API calls 102756->102758 102759 62350a 102757->102759 102758->102755 102759->102709 102760->102706 102762 626ab5 102761->102762 102763 65e41e 102761->102763 102866 6257a6 60 API calls Mailbox 102762->102866 102933 67f7a1 90 API calls 4 library calls 102763->102933 102766 65e431 102934 67f7a1 90 API calls 4 library calls 102766->102934 102767 626ad7 102867 6257f6 67 API calls 102767->102867 102769 626aec 102769->102766 102771 626af4 102769->102771 102773 627667 59 API calls 102771->102773 102772 65e44d 102776 626b61 102772->102776 102774 626b00 102773->102774 102868 640957 60 API calls __ftell_nolock 102774->102868 102778 65e460 102776->102778 102779 626b6f 102776->102779 102777 626b0c 102780 627667 59 API calls 102777->102780 102781 625c6f CloseHandle 102778->102781 102782 627667 59 API calls 102779->102782 102783 626b18 102780->102783 102784 65e46c 102781->102784 102785 626b78 102782->102785 102786 624750 60 API calls 102783->102786 102787 624ddd 136 API calls 102784->102787 102788 627667 59 API calls 102785->102788 102789 626b26 102786->102789 102790 65e488 102787->102790 102791 626b81 102788->102791 102869 625850 ReadFile SetFilePointerEx 102789->102869 102794 65e4b1 102790->102794 102798 68955b 122 API calls 102790->102798 102871 62459b 102791->102871 102935 67f7a1 90 API calls 4 library calls 102794->102935 102795 626b98 102799 627b2e 59 API calls 102795->102799 102797 626b52 102870 625aee SetFilePointerEx SetFilePointerEx 102797->102870 102802 65e4a4 102798->102802 102805 626ba9 SetCurrentDirectoryW 102799->102805 102800 65e4c8 102809 626d0c Mailbox 102800->102809 102803 65e4cd 102802->102803 102804 65e4ac 102802->102804 102807 624e4a 84 API calls 102803->102807 102806 624e4a 84 API calls 102804->102806 102811 626bbc Mailbox 102805->102811 102806->102794 102808 65e4d2 102807->102808 102810 640db6 Mailbox 59 API calls 102808->102810 102861 6257d4 102809->102861 102817 65e506 102810->102817 102813 640db6 Mailbox 59 API calls 102811->102813 102815 626bcf 102813->102815 102814 623bbb 102814->101473 102814->101482 102816 62522e 59 API calls 102815->102816 102843 626bda Mailbox __wsetenvp 102816->102843 102936 62750f 59 API calls 2 library calls 102817->102936 102819 626ce7 102929 625c6f 102819->102929 102820 65e740 102942 6872df 59 API calls Mailbox 102820->102942 102823 626cf3 SetCurrentDirectoryW 102823->102809 102826 65e762 102943 69fbce 59 API calls 2 library calls 102826->102943 102829 65e76f 102831 642d55 _free 58 API calls 102829->102831 102830 65e7d9 102946 67f7a1 90 API calls 4 library calls 102830->102946 102831->102809 102835 65e7f2 102835->102819 102837 65e7d1 102945 67f5f7 59 API calls 4 library calls 102837->102945 102840 627de1 59 API calls 102840->102843 102843->102819 102843->102830 102843->102837 102843->102840 102922 62586d 67 API calls _wcscpy 102843->102922 102923 626f5d GetStringTypeW 102843->102923 102924 626ecc 60 API calls __wcsnicmp 102843->102924 102925 626faa GetStringTypeW __wsetenvp 102843->102925 102926 64363d GetStringTypeW _iswctype 102843->102926 102927 6268dc 166 API calls 3 library calls 102843->102927 102928 627213 59 API calls Mailbox 102843->102928 102844 627de1 59 API calls 102851 65e54f Mailbox 102844->102851 102848 65e792 102944 67f7a1 90 API calls 4 library calls 102848->102944 102850 65e7ab 102852 642d55 _free 58 API calls 102850->102852 102851->102820 102851->102844 102851->102848 102937 67f73d 59 API calls 2 library calls 102851->102937 102938 67f65e 61 API calls 2 library calls 102851->102938 102939 68737f 59 API calls Mailbox 102851->102939 102940 62750f 59 API calls 2 library calls 102851->102940 102941 627213 59 API calls Mailbox 102851->102941 102853 65e7be 102852->102853 102853->102809 102854->102728 102855->102741 102856->102741 102857->102741 102858->102741 102859->102741 102860->102737 102862 625c6f CloseHandle 102861->102862 102863 6257dc Mailbox 102862->102863 102864 625c6f CloseHandle 102863->102864 102865 6257eb 102864->102865 102865->102814 102866->102767 102867->102769 102868->102777 102869->102797 102870->102776 102872 627667 59 API calls 102871->102872 102873 6245b1 102872->102873 102874 627667 59 API calls 102873->102874 102875 6245b9 102874->102875 102876 627667 59 API calls 102875->102876 102877 6245c1 102876->102877 102878 627667 59 API calls 102877->102878 102879 6245c9 102878->102879 102880 65d4d2 102879->102880 102881 6245fd 102879->102881 102882 628047 59 API calls 102880->102882 102883 62784b 59 API calls 102881->102883 102884 65d4db 102882->102884 102885 62460b 102883->102885 102886 627d8c 59 API calls 102884->102886 102887 627d2c 59 API calls 102885->102887 102889 624640 102886->102889 102888 624615 102887->102888 102888->102889 102890 62784b 59 API calls 102888->102890 102891 624680 102889->102891 102893 62465f 102889->102893 102904 65d4fb 102889->102904 102894 624636 102890->102894 102947 62784b 102891->102947 102898 6279f2 59 API calls 102893->102898 102897 627d2c 59 API calls 102894->102897 102895 624691 102899 6246a3 102895->102899 102902 628047 59 API calls 102895->102902 102896 65d5cb 102900 627bcc 59 API calls 102896->102900 102897->102889 102901 624669 102898->102901 102903 6246b3 102899->102903 102906 628047 59 API calls 102899->102906 102917 65d588 102900->102917 102901->102891 102905 62784b 59 API calls 102901->102905 102902->102899 102908 6246ba 102903->102908 102909 628047 59 API calls 102903->102909 102904->102896 102907 65d5b4 102904->102907 102916 65d532 102904->102916 102905->102891 102906->102903 102907->102896 102912 65d59f 102907->102912 102910 628047 59 API calls 102908->102910 102919 6246c1 Mailbox 102908->102919 102909->102908 102910->102919 102911 6279f2 59 API calls 102911->102917 102914 627bcc 59 API calls 102912->102914 102913 65d590 102915 627bcc 59 API calls 102913->102915 102914->102917 102915->102917 102916->102913 102920 65d57b 102916->102920 102917->102891 102917->102911 102960 627924 59 API calls 2 library calls 102917->102960 102919->102795 102921 627bcc 59 API calls 102920->102921 102921->102917 102922->102843 102923->102843 102924->102843 102925->102843 102926->102843 102927->102843 102928->102843 102930 625c88 102929->102930 102931 625c79 102929->102931 102930->102931 102932 625c8d CloseHandle 102930->102932 102931->102823 102932->102931 102933->102766 102934->102772 102935->102800 102936->102851 102937->102851 102938->102851 102939->102851 102940->102851 102941->102851 102942->102826 102943->102829 102944->102850 102945->102830 102946->102835 102948 6278b7 102947->102948 102949 62785a 102947->102949 102950 627d2c 59 API calls 102948->102950 102949->102948 102951 627865 102949->102951 102956 627888 _memmove 102950->102956 102952 627880 102951->102952 102953 65eb09 102951->102953 102961 627f27 59 API calls Mailbox 102952->102961 102955 628029 59 API calls 102953->102955 102957 65eb13 102955->102957 102956->102895 102958 640db6 Mailbox 59 API calls 102957->102958 102959 65eb33 102958->102959 102960->102917 102961->102956 102963 626d95 102962->102963 102967 626ea9 102962->102967 102964 640db6 Mailbox 59 API calls 102963->102964 102963->102967 102966 626dbc 102964->102966 102965 640db6 Mailbox 59 API calls 102968 626e31 102965->102968 102966->102965 102967->101625 102968->102967 102975 626240 102968->102975 103000 62735d 59 API calls Mailbox 102968->103000 103001 676553 59 API calls Mailbox 102968->103001 103002 62750f 59 API calls 2 library calls 102968->103002 102973->101628 102974->101630 102976 627a16 59 API calls 102975->102976 102994 626265 102976->102994 102977 62646a 103005 62750f 59 API calls 2 library calls 102977->103005 102979 626484 Mailbox 102979->102968 102982 627d8c 59 API calls 102982->102994 102983 62750f 59 API calls 102983->102994 102984 65dff6 103008 67f8aa 92 API calls 4 library calls 102984->103008 102988 65e004 103009 62750f 59 API calls 2 library calls 102988->103009 102990 626799 _memmove 103010 67f8aa 92 API calls 4 library calls 102990->103010 102991 65e01a 102991->102979 102992 65df92 102993 628029 59 API calls 102992->102993 102997 65df9d 102993->102997 102994->102977 102994->102982 102994->102983 102994->102984 102994->102990 102994->102992 102996 627e4f 59 API calls 102994->102996 103003 625f6c 60 API calls 102994->103003 103004 625d41 59 API calls Mailbox 102994->103004 103006 625e72 60 API calls 102994->103006 103007 627924 59 API calls 2 library calls 102994->103007 102998 62643b CharUpperBuffW 102996->102998 102999 640db6 Mailbox 59 API calls 102997->102999 102998->102994 102999->102990 103000->102968 103001->102968 103002->102968 103003->102994 103004->102994 103005->102979 103006->102994 103007->102994 103008->102988 103009->102991 103010->102979 103012 6230d2 LoadIconW 103011->103012 103014 623107 103012->103014 103014->101645 103015->101644 103017 62e6d5 103016->103017 103018 663aa9 103017->103018 103021 62e73f 103017->103021 103030 62e799 103017->103030 103186 629ea0 103018->103186 103024 627667 59 API calls 103021->103024 103021->103030 103022 627667 59 API calls 103022->103030 103025 663b04 103024->103025 103026 642d40 __cinit 67 API calls 103026->103030 103027 663b26 103027->101721 103030->103022 103030->103026 103030->103027 103031 62e95a 103030->103031 103032 62e970 Mailbox 103030->103032 103031->103032 103211 689e4a 90 API calls 4 library calls 103031->103211 103048 62f650 103047->103048 103049 62f4ba 103047->103049 103052 627de1 59 API calls 103048->103052 103050 62f4c6 103049->103050 103051 66441e 103049->103051 103316 62f290 332 API calls 2 library calls 103050->103316 103318 69bc6b 332 API calls Mailbox 103051->103318 103058 62f58c Mailbox 103052->103058 103055 66442c 103057 62f4fd 103057->103055 103057->103058 103064 624e4a 84 API calls 103058->103064 103224 69445a 103058->103224 103233 68cb7a 103058->103233 103313 683c37 103058->103313 103445 628180 103066->103445 103068 62fd3d 103146->101721 103147->101721 103148->101651 103150->101721 103151->101658 103152->101658 103153->101658 103154->101721 103155->101721 103156->101721 103158 629851 103157->103158 103159 62984b 103157->103159 103160 65f5d3 __i64tow 103158->103160 103161 629899 103158->103161 103163 629857 __itow 103158->103163 103166 65f4da 103158->103166 103159->101721 103487 643698 84 API calls 3 library calls 103161->103487 103165 640db6 Mailbox 59 API calls 103163->103165 103168 640db6 Mailbox 59 API calls 103166->103168 103173 65f552 Mailbox _wcscpy 103166->103173 103170 65f51f 103168->103170 103488 643698 84 API calls 3 library calls 103173->103488 103175->101721 103176->101721 103177->101721 103178->101706 103179->101706 103180->101706 103181->101706 103182->101706 103183->101706 103184->101706 103187 629ebf 103186->103187 103195 629eed Mailbox 103186->103195 103211->103032 103316->103057 103318->103055 103446 62818f 103445->103446 103449 6281aa 103445->103449 103447 627e4f 59 API calls 103446->103447 103448 628197 CharUpperBuffW 103447->103448 103448->103449 103449->103068 103487->103163 103488->103160 103489 7349e0 103490 7349f0 103489->103490 103491 734b0a LoadLibraryA 103490->103491 103495 734b4f VirtualProtect VirtualProtect 103490->103495 103492 734b21 103491->103492 103492->103490 103494 734b33 GetProcAddress 103492->103494 103494->103492 103497 734b49 ExitProcess 103494->103497 103496 734bb4 103495->103496 103496->103496 103498 621066 103503 62f76f 103498->103503 103500 62106c 103501 642d40 __cinit 67 API calls 103500->103501 103502 621076 103501->103502 103504 62f790 103503->103504 103536 63ff03 103504->103536 103508 62f7d7 103509 627667 59 API calls 103508->103509 103510 62f7e1 103509->103510 103511 627667 59 API calls 103510->103511 103512 62f7eb 103511->103512 103513 627667 59 API calls 103512->103513 103514 62f7f5 103513->103514 103515 627667 59 API calls 103514->103515 103516 62f833 103515->103516 103517 627667 59 API calls 103516->103517 103518 62f8fe 103517->103518 103546 635f87 103518->103546 103522 62f930 103523 627667 59 API calls 103522->103523 103524 62f93a 103523->103524 103574 63fd9e 103524->103574 103526 62f981 103527 62f991 GetStdHandle 103526->103527 103528 6645ab 103527->103528 103529 62f9dd 103527->103529 103528->103529 103531 6645b4 103528->103531 103530 62f9e5 OleInitialize 103529->103530 103530->103500 103581 686b38 64 API calls Mailbox 103531->103581 103533 6645bb 103582 687207 CreateThread 103533->103582 103535 6645c7 CloseHandle 103535->103530 103583 63ffdc 103536->103583 103539 63ffdc 59 API calls 103540 63ff45 103539->103540 103541 627667 59 API calls 103540->103541 103542 63ff51 103541->103542 103543 627bcc 59 API calls 103542->103543 103544 62f796 103543->103544 103545 640162 6 API calls 103544->103545 103545->103508 103547 627667 59 API calls 103546->103547 103548 635f97 103547->103548 103549 627667 59 API calls 103548->103549 103550 635f9f 103549->103550 103590 635a9d 103550->103590 103553 635a9d 59 API calls 103554 635faf 103553->103554 103555 627667 59 API calls 103554->103555 103556 635fba 103555->103556 103557 640db6 Mailbox 59 API calls 103556->103557 103558 62f908 103557->103558 103559 6360f9 103558->103559 103560 636107 103559->103560 103561 627667 59 API calls 103560->103561 103562 636112 103561->103562 103563 627667 59 API calls 103562->103563 103564 63611d 103563->103564 103565 627667 59 API calls 103564->103565 103566 636128 103565->103566 103567 627667 59 API calls 103566->103567 103568 636133 103567->103568 103569 635a9d 59 API calls 103568->103569 103570 63613e 103569->103570 103571 640db6 Mailbox 59 API calls 103570->103571 103572 636145 RegisterClipboardFormatW 103571->103572 103572->103522 103575 67576f 103574->103575 103576 63fdae 103574->103576 103593 689ae7 60 API calls 103575->103593 103577 640db6 Mailbox 59 API calls 103576->103577 103579 63fdb6 103577->103579 103579->103526 103580 67577a 103581->103533 103582->103535 103594 6871ed 65 API calls 103582->103594 103584 627667 59 API calls 103583->103584 103585 63ffe7 103584->103585 103586 627667 59 API calls 103585->103586 103587 63ffef 103586->103587 103588 627667 59 API calls 103587->103588 103589 63ff3b 103588->103589 103589->103539 103591 627667 59 API calls 103590->103591 103592 635aa5 103591->103592 103592->103553 103593->103580 103595 621016 103600 624974 103595->103600 103598 642d40 __cinit 67 API calls 103599 621025 103598->103599 103601 640db6 Mailbox 59 API calls 103600->103601 103602 62497c 103601->103602 103603 62101b 103602->103603 103607 624936 103602->103607 103603->103598 103608 62493f 103607->103608 103610 624951 103607->103610 103609 642d40 __cinit 67 API calls 103608->103609 103609->103610 103611 6249a0 103610->103611 103612 627667 59 API calls 103611->103612 103613 6249b8 GetVersionExW 103612->103613 103614 627bcc 59 API calls 103613->103614 103615 6249fb 103614->103615 103616 627d2c 59 API calls 103615->103616 103621 624a28 103615->103621 103617 624a1c 103616->103617 103618 627726 59 API calls 103617->103618 103618->103621 103619 624a93 GetCurrentProcess IsWow64Process 103620 624aac 103619->103620 103623 624ac2 103620->103623 103624 624b2b GetSystemInfo 103620->103624 103621->103619 103622 65d864 103621->103622 103635 624b37 103623->103635 103625 624af8 103624->103625 103625->103603 103628 624ad4 103631 624b37 2 API calls 103628->103631 103629 624b1f GetSystemInfo 103630 624ae9 103629->103630 103630->103625 103633 624aef FreeLibrary 103630->103633 103632 624adc GetNativeSystemInfo 103631->103632 103632->103630 103633->103625 103636 624ad0 103635->103636 103637 624b40 LoadLibraryA 103635->103637 103636->103628 103636->103629 103637->103636 103638 624b51 GetProcAddress 103637->103638 103638->103636 103639 621055 103644 622649 103639->103644 103642 642d40 __cinit 67 API calls 103643 621064 103642->103643 103645 627667 59 API calls 103644->103645 103646 6226b7 103645->103646 103651 623582 103646->103651 103649 622754 103650 62105a 103649->103650 103654 623416 59 API calls 2 library calls 103649->103654 103650->103642 103655 6235b0 103651->103655 103654->103649 103656 6235a1 103655->103656 103657 6235bd 103655->103657 103656->103649 103657->103656 103658 6235c4 RegOpenKeyExW 103657->103658 103658->103656 103659 6235de RegQueryValueExW 103658->103659 103660 623614 RegCloseKey 103659->103660 103661 6235ff 103659->103661 103660->103656 103661->103660 103662 66416f 103666 675fe6 103662->103666 103664 66417a 103665 675fe6 86 API calls 103664->103665 103665->103664 103667 676020 103666->103667 103671 675ff3 103666->103671 103667->103664 103668 676022 103678 629328 85 API calls Mailbox 103668->103678 103669 676027 103672 629837 85 API calls 103669->103672 103671->103667 103671->103668 103671->103669 103675 67601a 103671->103675 103673 67602e 103672->103673 103674 627b2e 59 API calls 103673->103674 103674->103667 103677 6295a0 59 API calls _wcsstr 103675->103677 103677->103667 103678->103669 103679 65fdfc 103717 62ab30 Mailbox _memmove 103679->103717 103683 640db6 59 API calls Mailbox 103683->103717 103686 62b525 103746 689e4a 90 API calls 4 library calls 103686->103746 103687 660055 103745 689e4a 90 API calls 4 library calls 103687->103745 103688 640db6 59 API calls Mailbox 103705 629f37 Mailbox 103688->103705 103690 62b475 103695 628047 59 API calls 103690->103695 103693 660064 103702 62a057 103695->103702 103697 62b47a 103697->103687 103708 6609e5 103697->103708 103698 627667 59 API calls 103698->103705 103700 628047 59 API calls 103700->103705 103701 676e8f 59 API calls 103701->103705 103703 627de1 59 API calls 103703->103717 103704 642d40 67 API calls __cinit 103704->103705 103705->103687 103705->103688 103705->103690 103705->103697 103705->103698 103705->103700 103705->103701 103705->103702 103705->103704 103706 6609d6 103705->103706 103709 62a55a 103705->103709 103734 62c8c0 332 API calls 2 library calls 103705->103734 103735 62b900 60 API calls Mailbox 103705->103735 103751 689e4a 90 API calls 4 library calls 103706->103751 103752 689e4a 90 API calls 4 library calls 103708->103752 103750 689e4a 90 API calls 4 library calls 103709->103750 103712 629ea0 332 API calls 103712->103717 103714 66086a 103748 629c90 59 API calls Mailbox 103714->103748 103716 660878 103749 689e4a 90 API calls 4 library calls 103716->103749 103717->103683 103717->103686 103717->103702 103717->103703 103717->103705 103717->103712 103717->103714 103717->103716 103719 66085c 103717->103719 103720 62b21c 103717->103720 103724 62b2b6 103717->103724 103725 676e8f 59 API calls 103717->103725 103728 69df37 103717->103728 103731 69df23 103717->103731 103736 629c90 59 API calls Mailbox 103717->103736 103740 69c193 86 API calls 2 library calls 103717->103740 103741 69c2e0 97 API calls Mailbox 103717->103741 103742 687956 59 API calls Mailbox 103717->103742 103743 69bc6b 332 API calls Mailbox 103717->103743 103744 67617e 59 API calls Mailbox 103717->103744 103719->103702 103747 67617e 59 API calls Mailbox 103719->103747 103737 629d3c 60 API calls Mailbox 103720->103737 103722 62b22d 103738 629d3c 60 API calls Mailbox 103722->103738 103739 62f6a3 332 API calls 103724->103739 103725->103717 103753 69cadd 103728->103753 103730 69df47 103730->103717 103732 69cadd 131 API calls 103731->103732 103733 69df33 103732->103733 103733->103717 103734->103705 103735->103705 103736->103717 103737->103722 103738->103724 103739->103686 103740->103717 103741->103717 103742->103717 103743->103717 103744->103717 103745->103693 103746->103719 103747->103702 103748->103719 103749->103719 103750->103702 103751->103708 103752->103702 103754 629837 85 API calls 103753->103754 103755 69cb1a 103754->103755 103774 69cb61 Mailbox 103755->103774 103791 69d7a5 103755->103791 103757 69cdb9 103758 69cf2e 103757->103758 103762 69cdc7 103757->103762 103830 69d8c8 93 API calls Mailbox 103758->103830 103761 69cf3d 103761->103762 103764 69cf49 103761->103764 103804 69c96e 103762->103804 103763 629837 85 API calls 103780 69cbb2 Mailbox 103763->103780 103764->103774 103769 69ce00 103819 640c08 103769->103819 103772 69ce1a 103825 689e4a 90 API calls 4 library calls 103772->103825 103773 69ce33 103776 6292ce 59 API calls 103773->103776 103774->103730 103778 69ce3f 103776->103778 103777 69ce25 GetCurrentProcess TerminateProcess 103777->103773 103779 629050 59 API calls 103778->103779 103781 69ce55 103779->103781 103780->103757 103780->103763 103780->103774 103823 69fbce 59 API calls 2 library calls 103780->103823 103824 69cfdf 61 API calls 2 library calls 103780->103824 103790 69ce7c 103781->103790 103826 628d40 59 API calls Mailbox 103781->103826 103783 69cfa4 103783->103774 103787 69cfb8 FreeLibrary 103783->103787 103784 69ce6b 103827 69d649 108 API calls _free 103784->103827 103787->103774 103790->103783 103828 628d40 59 API calls Mailbox 103790->103828 103829 629d3c 60 API calls Mailbox 103790->103829 103831 69d649 108 API calls _free 103790->103831 103792 627e4f 59 API calls 103791->103792 103793 69d7c0 CharLowerBuffW 103792->103793 103832 67f167 103793->103832 103797 627667 59 API calls 103798 69d7f9 103797->103798 103799 62784b 59 API calls 103798->103799 103800 69d810 103799->103800 103801 627d2c 59 API calls 103800->103801 103802 69d81c Mailbox 103801->103802 103803 69d858 Mailbox 103802->103803 103839 69cfdf 61 API calls 2 library calls 103802->103839 103803->103780 103805 69c989 103804->103805 103809 69c9de 103804->103809 103806 640db6 Mailbox 59 API calls 103805->103806 103808 69c9ab 103806->103808 103807 640db6 Mailbox 59 API calls 103807->103808 103808->103807 103808->103809 103810 69da50 103809->103810 103811 69dc79 Mailbox 103810->103811 103818 69da73 _strcat _wcscpy __wsetenvp 103810->103818 103811->103769 103812 629be6 59 API calls 103812->103818 103813 629b3c 59 API calls 103813->103818 103814 629b98 59 API calls 103814->103818 103815 629837 85 API calls 103815->103818 103816 64571c 58 API calls __malloc_crt 103816->103818 103818->103811 103818->103812 103818->103813 103818->103814 103818->103815 103818->103816 103842 685887 61 API calls 2 library calls 103818->103842 103821 640c1d 103819->103821 103820 640cb5 VirtualProtect 103822 640c83 103820->103822 103821->103820 103821->103822 103822->103772 103822->103773 103823->103780 103824->103780 103825->103777 103826->103784 103827->103790 103828->103790 103829->103790 103830->103761 103831->103790 103833 67f192 __wsetenvp 103832->103833 103834 67f1d1 103833->103834 103837 67f1c7 103833->103837 103838 67f278 103833->103838 103834->103797 103834->103802 103837->103834 103840 6278c4 61 API calls 103837->103840 103838->103834 103841 6278c4 61 API calls 103838->103841 103839->103803 103840->103837 103841->103838 103842->103818 103843 621078 103848 62708b 103843->103848 103845 62108c 103846 642d40 __cinit 67 API calls 103845->103846 103847 621096 103846->103847 103849 62709b __ftell_nolock 103848->103849 103850 627667 59 API calls 103849->103850 103851 627151 103850->103851 103852 624706 61 API calls 103851->103852 103853 62715a 103852->103853 103879 64050b 103853->103879 103856 627cab 59 API calls 103857 627173 103856->103857 103858 623f74 59 API calls 103857->103858 103859 627182 103858->103859 103860 627667 59 API calls 103859->103860 103861 62718b 103860->103861 103862 627d8c 59 API calls 103861->103862 103863 627194 RegOpenKeyExW 103862->103863 103864 65e8b1 RegQueryValueExW 103863->103864 103868 6271b6 Mailbox 103863->103868 103865 65e943 RegCloseKey 103864->103865 103866 65e8ce 103864->103866 103865->103868 103878 65e955 _wcscat Mailbox __wsetenvp 103865->103878 103867 640db6 Mailbox 59 API calls 103866->103867 103869 65e8e7 103867->103869 103868->103845 103871 62522e 59 API calls 103869->103871 103870 6279f2 59 API calls 103870->103878 103872 65e8f2 RegQueryValueExW 103871->103872 103873 65e90f 103872->103873 103875 65e929 103872->103875 103874 627bcc 59 API calls 103873->103874 103874->103875 103875->103865 103876 627de1 59 API calls 103876->103878 103877 623f74 59 API calls 103877->103878 103878->103868 103878->103870 103878->103876 103878->103877 103880 651940 __ftell_nolock 103879->103880 103881 640518 GetFullPathNameW 103880->103881 103882 64053a 103881->103882 103883 627bcc 59 API calls 103882->103883 103884 627165 103883->103884 103884->103856 103885 16b5460 103886 16b30b0 GetPEB 103885->103886 103887 16b553f 103886->103887 103899 16b5350 103887->103899 103900 16b5359 Sleep 103899->103900 103901 16b5367 103900->103901

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00623B68
                              • IsDebuggerPresent.KERNEL32 ref: 00623B7A
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,006E52F8,006E52E0,?,?), ref: 00623BEB
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                                • Part of subcall function 0063092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00623C14,006E52F8,?,?,?), ref: 0063096E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00623C6F
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006D7770,00000010), ref: 0065D281
                              • SetCurrentDirectoryW.KERNEL32(?,006E52F8,?,?,?), ref: 0065D2B9
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006D4260,006E52F8,?,?,?), ref: 0065D33F
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0065D346
                                • Part of subcall function 00623A46: GetSysColorBrush.USER32(0000000F), ref: 00623A50
                                • Part of subcall function 00623A46: LoadCursorW.USER32(00000000,00007F00), ref: 00623A5F
                                • Part of subcall function 00623A46: LoadIconW.USER32(00000063), ref: 00623A76
                                • Part of subcall function 00623A46: LoadIconW.USER32(000000A4), ref: 00623A88
                                • Part of subcall function 00623A46: LoadIconW.USER32(000000A2), ref: 00623A9A
                                • Part of subcall function 00623A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00623AC0
                                • Part of subcall function 00623A46: RegisterClassExW.USER32(?), ref: 00623B16
                                • Part of subcall function 006239D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00623A03
                                • Part of subcall function 006239D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623A24
                                • Part of subcall function 006239D5: ShowWindow.USER32(00000000,?,?), ref: 00623A38
                                • Part of subcall function 006239D5: ShowWindow.USER32(00000000,?,?), ref: 00623A41
                                • Part of subcall function 0062434A: _memset.LIBCMT ref: 00624370
                                • Part of subcall function 0062434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00624415
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas$%k
                              • API String ID: 529118366-1914796069
                              • Opcode ID: 8e45400d2b9fe4ca26ff5a2c2493fc2237c85e11cbdc912113483ca041857a29
                              • Instruction ID: 3fee73a7428dbe0ac516d198953b28adf7ccbb6fd652638a10ffac3335d93185
                              • Opcode Fuzzy Hash: 8e45400d2b9fe4ca26ff5a2c2493fc2237c85e11cbdc912113483ca041857a29
                              • Instruction Fuzzy Hash: A751E430E08AA8AECB11EBB4EC45EED7B7BAF45744F004069F512AA2A1DA745705CF25

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 758 623633-623681 760 623683-623686 758->760 761 6236e1-6236e3 758->761 762 6236e7 760->762 763 623688-62368f 760->763 761->760 764 6236e5 761->764 768 65d0cc-65d0fa call 631070 call 631093 762->768 769 6236ed-6236f0 762->769 765 623695-62369a 763->765 766 62374b-623753 PostQuitMessage 763->766 767 6236ca-6236d2 NtdllDefWindowProc_W 764->767 771 65d154-65d168 call 682527 765->771 772 6236a0-6236a2 765->772 773 623711-623713 766->773 774 6236d8-6236de 767->774 804 65d0ff-65d106 768->804 775 6236f2-6236f3 769->775 776 623715-62373c SetTimer RegisterClipboardFormatW 769->776 771->773 797 65d16e 771->797 780 623755-623764 call 6244a0 772->780 781 6236a8-6236ad 772->781 773->774 777 65d06f-65d072 775->777 778 6236f9-62370c KillTimer call 62443a call 623114 775->778 776->773 782 62373e-623749 CreatePopupMenu 776->782 790 65d074-65d076 777->790 791 65d0a8-65d0c7 MoveWindow 777->791 778->773 780->773 786 6236b3-6236b8 781->786 787 65d139-65d140 781->787 782->773 795 65d124-65d134 call 682d36 786->795 796 6236be-6236c4 786->796 787->767 793 65d146-65d14f call 677c36 787->793 799 65d097-65d0a3 SetFocus 790->799 800 65d078-65d07b 790->800 791->773 793->767 795->773 796->767 796->804 797->767 799->773 800->796 805 65d081-65d092 call 631070 800->805 804->767 808 65d10c-65d11f call 62443a call 62434a 804->808 805->773 808->767
                              APIs
                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 006236D2
                              • KillTimer.USER32(?,00000001), ref: 006236FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0062371F
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 0062372A
                              • CreatePopupMenu.USER32 ref: 0062373E
                              • PostQuitMessage.USER32(00000000), ref: 0062374D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                              • String ID: TaskbarCreated$%k
                              • API String ID: 157504867-2455537126
                              • Opcode ID: 17d1ad95ba7e6888e9bd43e7dff212921ed5ffba0311b88dd69080c293b1488a
                              • Instruction ID: b1c3f959b97093a158625909006c492ed4adf28c7de1e5b17929e083555dd54b
                              • Opcode Fuzzy Hash: 17d1ad95ba7e6888e9bd43e7dff212921ed5ffba0311b88dd69080c293b1488a
                              • Instruction Fuzzy Hash: AD413BB1100E75BBDF246F64FC59BB93A5BEB01300F100129F5039A3E1DB699E069F6A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1002 6249a0-624a00 call 627667 GetVersionExW call 627bcc 1007 624a06 1002->1007 1008 624b0b-624b0d 1002->1008 1010 624a09-624a0e 1007->1010 1009 65d767-65d773 1008->1009 1011 65d774-65d778 1009->1011 1012 624b12-624b13 1010->1012 1013 624a14 1010->1013 1015 65d77b-65d787 1011->1015 1016 65d77a 1011->1016 1014 624a15-624a4c call 627d2c call 627726 1012->1014 1013->1014 1024 624a52-624a53 1014->1024 1025 65d864-65d867 1014->1025 1015->1011 1018 65d789-65d78e 1015->1018 1016->1015 1018->1010 1020 65d794-65d79b 1018->1020 1020->1009 1022 65d79d 1020->1022 1026 65d7a2-65d7a5 1022->1026 1024->1026 1027 624a59-624a64 1024->1027 1028 65d880-65d884 1025->1028 1029 65d869 1025->1029 1030 624a93-624aaa GetCurrentProcess IsWow64Process 1026->1030 1031 65d7ab-65d7c9 1026->1031 1036 624a6a-624a6c 1027->1036 1037 65d7ea-65d7f0 1027->1037 1032 65d886-65d88f 1028->1032 1033 65d86f-65d878 1028->1033 1038 65d86c 1029->1038 1034 624aaf-624ac0 1030->1034 1035 624aac 1030->1035 1031->1030 1039 65d7cf-65d7d5 1031->1039 1032->1038 1046 65d891-65d894 1032->1046 1033->1028 1047 624ac2-624ad2 call 624b37 1034->1047 1048 624b2b-624b35 GetSystemInfo 1034->1048 1035->1034 1040 65d805-65d811 1036->1040 1041 624a72-624a75 1036->1041 1044 65d7f2-65d7f5 1037->1044 1045 65d7fa-65d800 1037->1045 1038->1033 1042 65d7d7-65d7da 1039->1042 1043 65d7df-65d7e5 1039->1043 1052 65d813-65d816 1040->1052 1053 65d81b-65d821 1040->1053 1049 65d831-65d834 1041->1049 1050 624a7b-624a8a 1041->1050 1042->1030 1043->1030 1044->1030 1045->1030 1046->1033 1059 624ad4-624ae1 call 624b37 1047->1059 1060 624b1f-624b29 GetSystemInfo 1047->1060 1051 624af8-624b08 1048->1051 1049->1030 1058 65d83a-65d84f 1049->1058 1055 624a90 1050->1055 1056 65d826-65d82c 1050->1056 1052->1030 1053->1030 1055->1030 1056->1030 1061 65d851-65d854 1058->1061 1062 65d859-65d85f 1058->1062 1067 624ae3-624ae7 GetNativeSystemInfo 1059->1067 1068 624b18-624b1d 1059->1068 1063 624ae9-624aed 1060->1063 1061->1030 1062->1030 1063->1051 1066 624aef-624af2 FreeLibrary 1063->1066 1066->1051 1067->1063 1068->1067
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 006249CD
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              • GetCurrentProcess.KERNEL32(?,006AFAEC,00000000,00000000,?), ref: 00624A9A
                              • IsWow64Process.KERNEL32(00000000), ref: 00624AA1
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00624AE7
                              • FreeLibrary.KERNEL32(00000000), ref: 00624AF2
                              • GetSystemInfo.KERNEL32(00000000), ref: 00624B23
                              • GetSystemInfo.KERNEL32(00000000), ref: 00624B2F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: 2bb8620211be97d9a59a78b548a5fc28e3862b511bf58a9666a2d3fb3f16707e
                              • Instruction ID: 6b15441b278be5a30d0a23ed884d32f796045e02a5726e2a1d0a13a81d556f1d
                              • Opcode Fuzzy Hash: 2bb8620211be97d9a59a78b548a5fc28e3862b511bf58a9666a2d3fb3f16707e
                              • Instruction Fuzzy Hash: DC91D531989BD0DEC731DB6894501EABFF6AF2A301F4449ADD0C793B41D621A908CB5A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1088 624e89-624ea1 CreateStreamOnHGlobal 1089 624ea3-624eba FindResourceExW 1088->1089 1090 624ec1-624ec6 1088->1090 1091 624ec0 1089->1091 1092 65d933-65d942 LoadResource 1089->1092 1091->1090 1092->1091 1093 65d948-65d956 SizeofResource 1092->1093 1093->1091 1094 65d95c-65d967 LockResource 1093->1094 1094->1091 1095 65d96d-65d98b 1094->1095 1095->1091
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00624E99
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00624D8E,?,?,00000000,00000000), ref: 00624EB0
                              • LoadResource.KERNEL32(?,00000000,?,?,00624D8E,?,?,00000000,00000000,?,?,?,?,?,?,00624E2F), ref: 0065D937
                              • SizeofResource.KERNEL32(?,00000000,?,?,00624D8E,?,?,00000000,00000000,?,?,?,?,?,?,00624E2F), ref: 0065D94C
                              • LockResource.KERNEL32(00624D8E,?,?,00624D8E,?,?,00000000,00000000,?,?,?,?,?,?,00624E2F,00000000), ref: 0065D95F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: c7771c720f0ecbaf2e6e5a4a3397b1614e58e5d2bbb2d32d850f8b1add98226a
                              • Instruction ID: 4827bdc8b9b7c5b21a080af63a9ab4e6eb0f2c107b2cc2ececbcf45d95b6e448
                              • Opcode Fuzzy Hash: c7771c720f0ecbaf2e6e5a4a3397b1614e58e5d2bbb2d32d850f8b1add98226a
                              • Instruction Fuzzy Hash: 98115A75240700BFE7219BA5EC48FA77BBBFBC6B11F214268F44686290DB61EC008E61
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: %k
                              • API String ID: 3964851224-3601005739
                              • Opcode ID: 4caa27f259a0c0ff13526f8fa9dba59b3a28d32cbfeb0178c22f6c2b387471c3
                              • Instruction ID: 6a8a45eadbe0b16aec760d7043a88da96fa4be65e89c16e962945c3a91109f34
                              • Opcode Fuzzy Hash: 4caa27f259a0c0ff13526f8fa9dba59b3a28d32cbfeb0178c22f6c2b387471c3
                              • Instruction Fuzzy Hash: 98928C706087519FE724DF14C490B6AB7E2BF85304F14896DE88A8B352DB71EC49CF96
                              APIs
                              • LoadLibraryA.KERNEL32(?), ref: 00734B1A
                              • GetProcAddress.KERNEL32(?,0072DFF9), ref: 00734B38
                              • ExitProcess.KERNEL32(?,0072DFF9), ref: 00734B49
                              • VirtualProtect.KERNELBASE(00620000,00001000,00000004,?,00000000), ref: 00734B97
                              • VirtualProtect.KERNELBASE(00620000,00001000), ref: 00734BAC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                              • String ID:
                              • API String ID: 1996367037-0
                              • Opcode ID: 8decb30141cfd37c5b6a5972196f465a7fcb736e604204a0326e199a524d7453
                              • Instruction ID: 6564a010526e5f00d646362c1144acd6d383eff8d80ac17eadfd4f362642b7e2
                              • Opcode Fuzzy Hash: 8decb30141cfd37c5b6a5972196f465a7fcb736e604204a0326e199a524d7453
                              • Instruction Fuzzy Hash: 075108B2A953525BE7299EB8CC80761B794EB51321F284738C5E2C73C7F7A87C068764
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,0065E398), ref: 0068446A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 0068447B
                              • FindClose.KERNEL32(00000000), ref: 0068448B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: a0cfda598c16333944a6fc1b9fb10070f9918db2a6fdaf88a124be736d6f11d4
                              • Instruction ID: fc92d01870a464f0b64e686f43e2a7bfbea6a2430f34c9b1dc3483f3794f107d
                              • Opcode Fuzzy Hash: a0cfda598c16333944a6fc1b9fb10070f9918db2a6fdaf88a124be736d6f11d4
                              • Instruction Fuzzy Hash: 90E0D8324105016743107BB8EC0D5E97BDEDF06335F100715F835C11E0EBB46D009AD6
                              Strings
                              • Variable must be of type 'Object'., xrefs: 00663E62
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: b94c7ab7bcbe7cb276cdcad18e95cd1ccd0844f67bb0795e94072c4923966826
                              • Instruction ID: 57e4b25fe421dd3d7195954d4369801dd27187795053fb7451360dc1e8d48e88
                              • Opcode Fuzzy Hash: b94c7ab7bcbe7cb276cdcad18e95cd1ccd0844f67bb0795e94072c4923966826
                              • Instruction Fuzzy Hash: 34A28C74A00A25CFCB24CF58E480AAAB7B3FF59310F648469E945AB351D736ED42CF91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00630A5B
                              • timeGetTime.WINMM ref: 00630D16
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00630E53
                              • Sleep.KERNEL32(0000000A), ref: 00630E61
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00630EFA
                              • DestroyWindow.USER32 ref: 00630F06
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00630F20
                              • Sleep.KERNEL32(0000000A,?,?), ref: 00664E83
                              • TranslateMessage.USER32(?), ref: 00665C60
                              • DispatchMessageW.USER32(?), ref: 00665C6E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00665C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4212290369-3242690629
                              • Opcode ID: 804402baa512691c416b491c34901ed041fa1af3f0ae744b0c2d2b80cf00b149
                              • Instruction ID: 9527dcbf540cb7ed306c6c1a39f604791558a0f6062ffcec61d7d0f2b7629632
                              • Opcode Fuzzy Hash: 804402baa512691c416b491c34901ed041fa1af3f0ae744b0c2d2b80cf00b149
                              • Instruction Fuzzy Hash: DCB2CF70608B41DFD724DF24C895BAAB7E7BF85304F14491DE58A873A1CB71E889CB86

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00688F5F: __time64.LIBCMT ref: 00688F69
                                • Part of subcall function 00624EE5: _fseek.LIBCMT ref: 00624EFD
                              • __wsplitpath.LIBCMT ref: 00689234
                                • Part of subcall function 006440FB: __wsplitpath_helper.LIBCMT ref: 0064413B
                              • _wcscpy.LIBCMT ref: 00689247
                              • _wcscat.LIBCMT ref: 0068925A
                              • __wsplitpath.LIBCMT ref: 0068927F
                              • _wcscat.LIBCMT ref: 00689295
                              • _wcscat.LIBCMT ref: 006892A8
                                • Part of subcall function 00688FA5: _memmove.LIBCMT ref: 00688FDE
                                • Part of subcall function 00688FA5: _memmove.LIBCMT ref: 00688FED
                              • _wcscmp.LIBCMT ref: 006891EF
                                • Part of subcall function 00689734: _wcscmp.LIBCMT ref: 00689824
                                • Part of subcall function 00689734: _wcscmp.LIBCMT ref: 00689837
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00689452
                              • _wcsncpy.LIBCMT ref: 006894C5
                              • DeleteFileW.KERNEL32(?,?), ref: 006894FB
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00689511
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00689522
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00689534
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: b3c7dc915e72f19a30885fa34bfd0523267c56a17a8ff8a10d9bb1e854874a1a
                              • Instruction ID: f39653f42829abfa12f8c206b4a5a487a2b6abca1db98be9664f2eb2762ea869
                              • Opcode Fuzzy Hash: b3c7dc915e72f19a30885fa34bfd0523267c56a17a8ff8a10d9bb1e854874a1a
                              • Instruction Fuzzy Hash: 6DC141B1D00119ABDF61EF95CC85AEEB7BEEF85310F0041AAF609E7141DB309A458F65

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00624706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006E52F8,?,006237AE,?), ref: 00624724
                                • Part of subcall function 0064050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00627165), ref: 0064052D
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006271A8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0065E8C8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0065E909
                              • RegCloseKey.ADVAPI32(?), ref: 0065E947
                              • _wcscat.LIBCMT ref: 0065E9A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 313f735f4c71cfe90c3d45738c59f5bbf1ae190ef49d3f068cd89d4f322355ff
                              • Instruction ID: 416e3faf0cc0d1726386208e1bb2ab19321c4c96638a61d48031875986efe404
                              • Opcode Fuzzy Hash: 313f735f4c71cfe90c3d45738c59f5bbf1ae190ef49d3f068cd89d4f322355ff
                              • Instruction Fuzzy Hash: 6871E1715083519EC344EF25EC819ABBBEAFF55390F40192EF5458B2A0DB319A48CF96

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00623A50
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00623A5F
                              • LoadIconW.USER32(00000063), ref: 00623A76
                              • LoadIconW.USER32(000000A4), ref: 00623A88
                              • LoadIconW.USER32(000000A2), ref: 00623A9A
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00623AC0
                              • RegisterClassExW.USER32(?), ref: 00623B16
                                • Part of subcall function 00623041: GetSysColorBrush.USER32(0000000F), ref: 00623074
                                • Part of subcall function 00623041: RegisterClassExW.USER32(00000030), ref: 0062309E
                                • Part of subcall function 00623041: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 006230AF
                                • Part of subcall function 00623041: LoadIconW.USER32(000000A9), ref: 006230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                              • String ID: #$0$AutoIt v3
                              • API String ID: 2880975755-4155596026
                              • Opcode ID: 94528747a93fbc6a056c074380563bbddc7598f121db2bb8e29fe01abbcfe067
                              • Instruction ID: 0278d253f238d41dc8c8df19df68289978f710c8c30d0d1d13184a6845a8e492
                              • Opcode Fuzzy Hash: 94528747a93fbc6a056c074380563bbddc7598f121db2bb8e29fe01abbcfe067
                              • Instruction Fuzzy Hash: BC214B70D00754AFEB10DFA4EC89B9D7BB6FB08719F00112AF601AE2E1D7B596408F95

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: abbd80e33e1a59ec5451b941c71ad0429da4ea6aca738f1a8f4d0389e855e52a
                              • Instruction ID: d8e5dd18f24bf15179201cb726d4305c36ccba1be815061c4e8d03401dfd1445
                              • Opcode Fuzzy Hash: abbd80e33e1a59ec5451b941c71ad0429da4ea6aca738f1a8f4d0389e855e52a
                              • Instruction Fuzzy Hash: 5BA14C71900A3D9ACB54EBA0EC91AEEB77ABF55300F44042EF516B7291EF745A08CF64

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00623074
                              • RegisterClassExW.USER32(00000030), ref: 0062309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 006230AF
                              • LoadIconW.USER32(000000A9), ref: 006230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: 6cb13191f34641b614e730f215a63f7ea16bd199fcc64b34c3600622d77e1e8e
                              • Instruction ID: 91974da2e25a8f01a19e2e945ead3ab808fde5dd79837cdd82ed908bdbd2bd41
                              • Opcode Fuzzy Hash: 6cb13191f34641b614e730f215a63f7ea16bd199fcc64b34c3600622d77e1e8e
                              • Instruction Fuzzy Hash: 66315A71845354EFDB10DFE4E884A9ABFF2FB0A314F14516EE581EA2A0D3B55540CF91

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00623074
                              • RegisterClassExW.USER32(00000030), ref: 0062309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 006230AF
                              • LoadIconW.USER32(000000A9), ref: 006230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: a573636607af37919fd90f21b46ec6c6df79b50d05cd26d08933c2a77f37ccbf
                              • Instruction ID: c05a93e9e258d7ce924a7bfcdab44bb83239a7afe29c275bd48ec989f1939152
                              • Opcode Fuzzy Hash: a573636607af37919fd90f21b46ec6c6df79b50d05cd26d08933c2a77f37ccbf
                              • Instruction Fuzzy Hash: 1221E8B1911358AFDB00EFD4E888B9EBBF6FB09704F00512AF611AA2A0D7B155448F91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 948 16b56c0-16b576e call 16b30b0 951 16b5775-16b579b call 16b65d0 CreateFileW 948->951 954 16b579d 951->954 955 16b57a2-16b57b2 951->955 956 16b58ed-16b58f1 954->956 963 16b57b9-16b57d3 VirtualAlloc 955->963 964 16b57b4 955->964 957 16b5933-16b5936 956->957 958 16b58f3-16b58f7 956->958 960 16b5939-16b5940 957->960 961 16b58f9-16b58fc 958->961 962 16b5903-16b5907 958->962 965 16b5942-16b594d 960->965 966 16b5995-16b59aa 960->966 961->962 967 16b5909-16b5913 962->967 968 16b5917-16b591b 962->968 969 16b57da-16b57f1 ReadFile 963->969 970 16b57d5 963->970 964->956 971 16b594f 965->971 972 16b5951-16b595d 965->972 973 16b59ba-16b59c2 966->973 974 16b59ac-16b59b7 VirtualFree 966->974 967->968 975 16b592b 968->975 976 16b591d-16b5927 968->976 977 16b57f8-16b5838 VirtualAlloc 969->977 978 16b57f3 969->978 970->956 971->966 981 16b595f-16b596f 972->981 982 16b5971-16b597d 972->982 974->973 975->957 976->975 979 16b583a 977->979 980 16b583f-16b585a call 16b6820 977->980 978->956 979->956 988 16b5865-16b586f 980->988 984 16b5993 981->984 985 16b598a-16b5990 982->985 986 16b597f-16b5988 982->986 984->960 985->984 986->984 989 16b58a2-16b58b6 call 16b6630 988->989 990 16b5871-16b58a0 call 16b6820 988->990 996 16b58ba-16b58be 989->996 997 16b58b8 989->997 990->988 998 16b58ca-16b58ce 996->998 999 16b58c0-16b58c4 CloseHandle 996->999 997->956 1000 16b58de-16b58e7 998->1000 1001 16b58d0-16b58db VirtualFree 998->1001 999->998 1000->951 1000->956 1001->1000
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016B5791
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016B59B7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                              • Instruction ID: 2530ce01885856827f932bdb2aaec65984425382b2e3bb8bf1d1dfe38cdc7358
                              • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                              • Instruction Fuzzy Hash: A9A11A70E00219EBDB14DFA4C894BEEBBB5FF48304F208559E216BB281D7759A85CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1069 627285-6272a5 call 651940 1072 65ea22-65ea8b call 642de0 7574D0D0 1069->1072 1073 6272ab-6272d8 call 624750 call 640791 call 62700b call 62686a 1069->1073 1079 65ea94-65ea9d call 627bcc 1072->1079 1080 65ea8d 1072->1080 1083 65eaa2 1079->1083 1080->1079 1083->1083
                              APIs
                              • _memset.LIBCMT ref: 0065EA39
                              • 7574D0D0.COMDLG32(?), ref: 0065EA83
                                • Part of subcall function 00624750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00624743,?,?,006237AE,?), ref: 00624770
                                • Part of subcall function 00640791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006407B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: NamePath$7574FullLong_memset
                              • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$X$au3
                              • API String ID: 3399031285-1954568251
                              • Opcode ID: afd0a07a78ccdad7dae6645ff7a1b22f33c26884fc7b4700734c63f7c1b70f71
                              • Instruction ID: 7223d76f4e260748eb2ef57113335aa81b98074f1e48c8fa6784dc30d098f325
                              • Opcode Fuzzy Hash: afd0a07a78ccdad7dae6645ff7a1b22f33c26884fc7b4700734c63f7c1b70f71
                              • Instruction Fuzzy Hash: 0621C070A006589FDF419F94D845BEE7BFAAF49315F00401AE908AB341DBB45A898FA6

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1098 6239d5-623a45 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00623A03
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623A24
                              • ShowWindow.USER32(00000000,?,?), ref: 00623A38
                              • ShowWindow.USER32(00000000,?,?), ref: 00623A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: 7eba9eb3f5ccb48ddede60270728117a73b40f8590bd542b1aae058c9ad902d1
                              • Instruction ID: a7f7beaa681723e6ff8a2e73507c85bf4ff28ab585a4037e8848deda1dbe9cfc
                              • Opcode Fuzzy Hash: 7eba9eb3f5ccb48ddede60270728117a73b40f8590bd542b1aae058c9ad902d1
                              • Instruction Fuzzy Hash: 0AF01770600390BEEB206B63AC88E6B3E7ED7C7F54B00102ABB01AA1B1C2611840CAB1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1099 62686a-626891 call 624ddd 1102 65e031-65e041 call 68955b 1099->1102 1103 626897-6268a5 call 624ddd 1099->1103 1106 65e046-65e048 1102->1106 1103->1102 1110 6268ab-6268b1 1103->1110 1108 65e067-65e0af call 640db6 1106->1108 1109 65e04a-65e04d call 624e4a 1106->1109 1120 65e0d4 1108->1120 1121 65e0b1-65e0bb 1108->1121 1114 65e052-65e061 call 6842f8 1109->1114 1113 6268b7-6268d9 call 626a8c 1110->1113 1110->1114 1114->1108 1122 65e0d6-65e0e9 1120->1122 1123 65e0cf-65e0d0 1121->1123 1126 65e260-65e263 call 642d55 1122->1126 1127 65e0ef 1122->1127 1124 65e0d2 1123->1124 1125 65e0bd-65e0cc 1123->1125 1124->1122 1125->1123 1130 65e268-65e271 call 624e4a 1126->1130 1128 65e0f6-65e0f9 call 627480 1127->1128 1133 65e0fe-65e120 call 625db2 call 6873e9 1128->1133 1136 65e273-65e283 call 627616 call 625d9b 1130->1136 1143 65e134-65e13e call 6873d3 1133->1143 1144 65e122-65e12f 1133->1144 1150 65e288-65e2b8 call 67f7a1 call 640e2c call 642d55 call 624e4a 1136->1150 1152 65e140-65e153 1143->1152 1153 65e158-65e162 call 6873bd 1143->1153 1146 65e227-65e237 call 62750f 1144->1146 1146->1133 1156 65e23d-65e25a call 62735d 1146->1156 1150->1136 1152->1146 1160 65e164-65e171 1153->1160 1161 65e176-65e180 call 625e2a 1153->1161 1156->1126 1156->1128 1160->1146 1161->1146 1168 65e186-65e19e call 67f73d 1161->1168 1174 65e1c1-65e1c4 1168->1174 1175 65e1a0-65e1bf call 627de1 call 625904 1168->1175 1176 65e1c6-65e1e1 call 627de1 call 626839 call 625904 1174->1176 1177 65e1f2-65e1f5 1174->1177 1198 65e1e2-65e1f0 call 625db2 1175->1198 1176->1198 1181 65e215-65e218 call 68737f 1177->1181 1182 65e1f7-65e200 call 67f65e 1177->1182 1187 65e21d-65e226 call 640e2c 1181->1187 1182->1150 1190 65e206-65e210 call 640e2c 1182->1190 1187->1146 1190->1133 1198->1187
                              APIs
                                • Part of subcall function 00624DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624E0F
                              • _free.LIBCMT ref: 0065E263
                              • _free.LIBCMT ref: 0065E2AA
                                • Part of subcall function 00626A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00626BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: /vb$>>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-3773348423
                              • Opcode ID: 4a9915f9ba4d7e3833287768adc0b34f29c46239af0ef206881699861188b4dd
                              • Instruction ID: 753dfe03ce17015be5f82c0ac779467fe866167f0097b8e6315cf11a5997be30
                              • Opcode Fuzzy Hash: 4a9915f9ba4d7e3833287768adc0b34f29c46239af0ef206881699861188b4dd
                              • Instruction Fuzzy Hash: 35917C719006299FCF18EFA4DC819EDB7B6BF09310F10442EF816AB2A1DB759A15CF54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1203 16b5460-16b55b5 call 16b30b0 call 16b5350 CreateFileW 1210 16b55bc-16b55cc 1203->1210 1211 16b55b7 1203->1211 1214 16b55ce 1210->1214 1215 16b55d3-16b55ed VirtualAlloc 1210->1215 1212 16b566c-16b5671 1211->1212 1214->1212 1216 16b55ef 1215->1216 1217 16b55f1-16b5608 ReadFile 1215->1217 1216->1212 1218 16b560a 1217->1218 1219 16b560c-16b5646 call 16b5390 call 16b4350 1217->1219 1218->1212 1224 16b5648-16b565d call 16b53e0 1219->1224 1225 16b5662-16b566a ExitProcess 1219->1225 1224->1225 1225->1212
                              APIs
                                • Part of subcall function 016B5350: Sleep.KERNELBASE(000001F4), ref: 016B5361
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016B55AB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: VH287ZEOA3Y7TSD3MBEWPX
                              • API String ID: 2694422964-3329802950
                              • Opcode ID: 0e76701b14dca6d2b0b656bc4ef6221d8079afcb8d9a1145093a11e420e77826
                              • Instruction ID: 86d5f525f88648dd8c9c92692daac747c1a8bd05295366dd7f4ddb350ea070df
                              • Opcode Fuzzy Hash: 0e76701b14dca6d2b0b656bc4ef6221d8079afcb8d9a1145093a11e420e77826
                              • Instruction Fuzzy Hash: 44618170D04288DBEF11DBA4DC94BEEBBB9AF15304F044199E209BB2C1D7BA1B45CB65
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0065D3D7
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              • _memset.LIBCMT ref: 006240FC
                              • _wcscpy.LIBCMT ref: 00624150
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00624160
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: 2af0063c789f21dc92895c4405931f081c203f047f941b44b7908dba9be29586
                              • Instruction ID: a6be69154d49189a7ca9818ca15e909444502217fe4cbb2a32e288f86be9ddac
                              • Opcode Fuzzy Hash: 2af0063c789f21dc92895c4405931f081c203f047f941b44b7908dba9be29586
                              • Instruction Fuzzy Hash: 5331CF31008B55AED760EB60EC86FDB77DAAF44304F10491EF686961A1DF70A648CF8B
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction ID: 26e98994ce1d03fc4fddb8e84ce4f37b91b13ac5989830b873261ffbfab86d04
                              • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction Fuzzy Hash: A451B570A00B05DBDB289FA9D8806BE77A7AF41321F24872DF8269A3D2D7709D518B40
                              APIs
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00640193
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0064019B
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006401A6
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006401B1
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006401B9
                                • Part of subcall function 00640162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006401C1
                                • Part of subcall function 006360F9: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 00636154
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0062F9CD
                              • OleInitialize.OLE32(00000000), ref: 0062FA4A
                              • CloseHandle.KERNEL32(00000000), ref: 006645C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                              • String ID: %k
                              • API String ID: 3094916012-3601005739
                              • Opcode ID: 3a4184785250ddbf1c8db809d2a646496be64b5e00d689debd30896691f74b3f
                              • Instruction ID: 5de141e906b1b270f3b52c5edf49d1845d4c3e8dc2e3fcdd16cd8899afea3c49
                              • Opcode Fuzzy Hash: 3a4184785250ddbf1c8db809d2a646496be64b5e00d689debd30896691f74b3f
                              • Instruction Fuzzy Hash: 5881ADB0911BC1CFC784EF29A984A597BE7FB9830E750A12ED11BCF2A1EB7044858F55
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006235A1,SwapMouseButtons,00000004,?), ref: 006235D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006235A1,SwapMouseButtons,00000004,?,?,?,?,00622754), ref: 006235F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,006235A1,SwapMouseButtons,00000004,?,?,?,?,00622754), ref: 00623617
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: fc5f1fcb132bca16bad12ac881556eb961d392402bf4d1f4ba9d32e19fa31037
                              • Instruction ID: 4b2f9c9a7873933a64a06338a8652e5240d6d838875a4134420fa81ebffb05ff
                              • Opcode Fuzzy Hash: fc5f1fcb132bca16bad12ac881556eb961d392402bf4d1f4ba9d32e19fa31037
                              • Instruction Fuzzy Hash: CC114871610628BFDB209FA4EC40AEEB7BEEF05740F015469E805D7310E371AE409B60
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 016B4B7D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016B4BA1
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016B4BC3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                              • Instruction ID: aba848f41481e668e19d8d2fb7879f06e74ce004fa4a283c606a61c36d6cbfbb
                              • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                              • Instruction Fuzzy Hash: 5362FD30A142589BEB24CFA4CC90BDEB776EF58300F1091A9D10DEB395EB759E81CB59
                              APIs
                                • Part of subcall function 00624EE5: _fseek.LIBCMT ref: 00624EFD
                                • Part of subcall function 00689734: _wcscmp.LIBCMT ref: 00689824
                                • Part of subcall function 00689734: _wcscmp.LIBCMT ref: 00689837
                              • _free.LIBCMT ref: 006896A2
                              • _free.LIBCMT ref: 006896A9
                              • _free.LIBCMT ref: 00689714
                                • Part of subcall function 00642D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00649A24), ref: 00642D69
                                • Part of subcall function 00642D55: GetLastError.KERNEL32(00000000,?,00649A24), ref: 00642D7B
                              • _free.LIBCMT ref: 0068971C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                              • Instruction ID: 203ce446b8c6ae054de069cf6062cf0d3dacfde601e89f8990f01956b96e6c1c
                              • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                              • Instruction Fuzzy Hash: AF5160B1D04218AFDF649F64DC81AAEBB7AEF88300F14059EF209A3341DB715A80CF58
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction ID: 930072b85efa6918722c0237b0a3d8508de926c50efee07a5ab237e07a604f43
                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction Fuzzy Hash: 3841A175A006459FDB188F69C882BEE7BA7AF42364B24857DE81587640EF70DD42CB44
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: AU3!P/k$EA06
                              • API String ID: 4104443479-947634993
                              • Opcode ID: 8c0d22e2f88f1237fb2a920ce468136b9baedcb53aba8316af59e607727d43ae
                              • Instruction ID: bbd69b95f2385a23fca851b9c0a40a4cfe5edac4177bed78f64de250fec821fc
                              • Opcode Fuzzy Hash: 8c0d22e2f88f1237fb2a920ce468136b9baedcb53aba8316af59e607727d43ae
                              • Instruction Fuzzy Hash: 13415C21A04A7857DF219B64FC917FE7FA39F45300F684869EC82DB386DE209D458FA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: 78b77a54c0c916a178c33c9a6b6e43debc8199cce319ba48da43795c3daaa769
                              • Instruction ID: 1631917c82f700ff4d183aa04757521ece419ad99e2c254eaeda88a9d19a5d03
                              • Opcode Fuzzy Hash: 78b77a54c0c916a178c33c9a6b6e43debc8199cce319ba48da43795c3daaa769
                              • Instruction Fuzzy Hash: 1801F971C042187FDB58DBA8C816EFE7BF9DF11301F00419FF552D2281E874A60487A0
                              APIs
                                • Part of subcall function 0064571C: __FF_MSGBANNER.LIBCMT ref: 00645733
                                • Part of subcall function 0064571C: __NMSG_WRITE.LIBCMT ref: 0064573A
                                • Part of subcall function 0064571C: RtlAllocateHeap.NTDLL(01500000,00000000,00000001), ref: 0064575F
                              • std::exception::exception.LIBCMT ref: 00640DEC
                              • __CxxThrowException@8.LIBCMT ref: 00640E01
                                • Part of subcall function 0064859B: RaiseException.KERNEL32(?,?,00000000,006D9E78,?,00000001,?,?,?,00640E06,00000000,006D9E78,00629E8C,00000001), ref: 006485F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID: bad allocation
                              • API String ID: 3902256705-2104205924
                              • Opcode ID: 8ee61882e812137eb458074c74a62260f7f8de58ff04e7a68f0b89d615f53e2a
                              • Instruction ID: 85efb2d76d1933edb9145388143853d91f275441199cc1195d44c3b5daa33950
                              • Opcode Fuzzy Hash: 8ee61882e812137eb458074c74a62260f7f8de58ff04e7a68f0b89d615f53e2a
                              • Instruction Fuzzy Hash: ABF0A47190022AA6DB10BEA8EC219DE7BEE9F01311F10082EFA0496292DF709A9486D5
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 006898F8
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0068990F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: bd3ee589cd398703f922f6789bf9c278881f5c03abd2eca070276a6ea4397805
                              • Instruction ID: e1d2b9debb564981ca035f608afae9db7222dfe3cc4adfca61d3b2ba2d442495
                              • Opcode Fuzzy Hash: bd3ee589cd398703f922f6789bf9c278881f5c03abd2eca070276a6ea4397805
                              • Instruction Fuzzy Hash: 91D05B7594030D6BDB50ABD0DC0DFD6773DD704701F0002B1BA5491191D97066548F91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0017ff7ee038409a8990686177ae785f8ada77d2f7003f95c09c46cdca49965a
                              • Instruction ID: aea5431b28631a96d4ef8274c847f3412798afcec9c31766f8bcf5cc13f01af2
                              • Opcode Fuzzy Hash: 0017ff7ee038409a8990686177ae785f8ada77d2f7003f95c09c46cdca49965a
                              • Instruction Fuzzy Hash: B5F14E716087019FCB54DF28C48096ABBEAFF89324F54892EF8999B351D730E945CF92
                              APIs
                              • _memset.LIBCMT ref: 00624370
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00624415
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00624432
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: 996159dbc1dd275f799f0c5fa0b167a1bb7a54a406a0ca06eae7b33cc687d488
                              • Instruction ID: 356b029bf32afa71db83a8683f18bee543af054ed971620656965daf156ba5b5
                              • Opcode Fuzzy Hash: 996159dbc1dd275f799f0c5fa0b167a1bb7a54a406a0ca06eae7b33cc687d488
                              • Instruction Fuzzy Hash: 5F319370505B118FD720EF24E8846DBBBF9FB48308F00092EF69A86351DB70A944CF52
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00645733
                                • Part of subcall function 0064A16B: __NMSG_WRITE.LIBCMT ref: 0064A192
                                • Part of subcall function 0064A16B: __NMSG_WRITE.LIBCMT ref: 0064A19C
                              • __NMSG_WRITE.LIBCMT ref: 0064573A
                                • Part of subcall function 0064A1C8: GetModuleFileNameW.KERNEL32(00000000,006E33BA,00000104,00000000,00000001,00000000), ref: 0064A25A
                                • Part of subcall function 0064A1C8: ___crtMessageBoxW.LIBCMT ref: 0064A308
                                • Part of subcall function 0064309F: ___crtCorExitProcess.LIBCMT ref: 006430A5
                                • Part of subcall function 0064309F: ExitProcess.KERNEL32 ref: 006430AE
                                • Part of subcall function 00648B28: __getptd_noexit.LIBCMT ref: 00648B28
                              • RtlAllocateHeap.NTDLL(01500000,00000000,00000001), ref: 0064575F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: 43074822e8364324c366b728482692f5c51a0dc9f6610e3d1a4f638244a33785
                              • Instruction ID: 617e525efd6fd0215cd2399ca90d6cf5e02836d5212374fcf9164b07599804b4
                              • Opcode Fuzzy Hash: 43074822e8364324c366b728482692f5c51a0dc9f6610e3d1a4f638244a33785
                              • Instruction Fuzzy Hash: 0401DE31240B21EFE7513B78EC86AAE738B8F82761F101539F5069B382EE749D014A69
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00689548,?,?,?,?,?,00000004), ref: 006898BB
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00689548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006898D1
                              • CloseHandle.KERNEL32(00000000,?,00689548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006898D8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 984edd8c5cfcb4c7cdee43a64191c4dea6422ca9f85afe1b74265d5536eacb40
                              • Instruction ID: 237b5005c78ec637e27f70c2ce33c9eeed0bb840da2ea39c07fab485c28ac451
                              • Opcode Fuzzy Hash: 984edd8c5cfcb4c7cdee43a64191c4dea6422ca9f85afe1b74265d5536eacb40
                              • Instruction Fuzzy Hash: EFE08632240214BBDB313B94EC09FDA7B5AAB07760F144221FB54691E087B129119BD9
                              APIs
                              • _free.LIBCMT ref: 00688D1B
                                • Part of subcall function 00642D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00649A24), ref: 00642D69
                                • Part of subcall function 00642D55: GetLastError.KERNEL32(00000000,?,00649A24), ref: 00642D7B
                              • _free.LIBCMT ref: 00688D2C
                              • _free.LIBCMT ref: 00688D3E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction ID: 19073b72f6157b86c3bd1d831e93801bba71843a23933c05eddb933223a97924
                              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                              • Instruction Fuzzy Hash: 6FE012A1A016024ACB64B678A940AD313DE8F9C392FA40A1DF40DD7286DE64FC828228
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: 19395b65963c0f1c94d8a34af575960ac44c0ff45ed4e795893e12eb4f0de314
                              • Instruction ID: 653ba0b983189342a21755959dcd047921fc3c10f64b46d73c07c1e8ee0b7a1d
                              • Opcode Fuzzy Hash: 19395b65963c0f1c94d8a34af575960ac44c0ff45ed4e795893e12eb4f0de314
                              • Instruction Fuzzy Hash: CB225670608B21DFDB24DF54D490A6AB7E2BF84304F14896DE88A9B362D771EC45CF86
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                              • Instruction ID: f7d734698e9ba13a032664dd20c3865f6e8ca0eafd3f72976f2ff5e999f4e0c8
                              • Opcode Fuzzy Hash: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
                              • Instruction Fuzzy Hash: E831B6B1604A16AFC704DF68D8D1D69F3AAFF48320715862DE919CB791EB30E921CF94
                              APIs
                              • 74D2C8D0.UXTHEME ref: 00624834
                                • Part of subcall function 0064336C: __lock.LIBCMT ref: 00643372
                                • Part of subcall function 0064336C: RtlDecodePointer.NTDLL(00000001), ref: 0064337E
                                • Part of subcall function 0064336C: RtlEncodePointer.NTDLL(?), ref: 00643389
                                • Part of subcall function 006248FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00624915
                                • Part of subcall function 006248FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0062492A
                                • Part of subcall function 00623B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00623B68
                                • Part of subcall function 00623B3A: IsDebuggerPresent.KERNEL32 ref: 00623B7A
                                • Part of subcall function 00623B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,006E52F8,006E52E0,?,?), ref: 00623BEB
                                • Part of subcall function 00623B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00623C6F
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00624874
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$DebuggerDecodeEncodeFullNamePathPresent__lock
                              • String ID:
                              • API String ID: 2688871447-0
                              • Opcode ID: 9a4a29ec9d92f0f9ba9b4bd087454b0e6993be3616476ffb3160aa80d5ea0400
                              • Instruction ID: 1b2c0818f0a49f73f437a02875f9b4066f0af8f9bbbc7caf2d68c8b7012b197c
                              • Opcode Fuzzy Hash: 9a4a29ec9d92f0f9ba9b4bd087454b0e6993be3616476ffb3160aa80d5ea0400
                              • Instruction Fuzzy Hash: 7511DF718087A19FC700EF68E88580ABFEAEF99750F10891EF1418B2B1DB70D604CF96
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: 2e6992d90879e38aa75cf8e9d52df6135063504821721812304379d401254f48
                              • Instruction ID: 63a08cd6a681a0779b2f807870a5a5b3dcca370d1449ea71c463bd37374ff14a
                              • Opcode Fuzzy Hash: 2e6992d90879e38aa75cf8e9d52df6135063504821721812304379d401254f48
                              • Instruction Fuzzy Hash: FF01FC71C01A04EFCF51AFA88C064DE7B63AF52321F514119F8141B262DB318511DF55
                              APIs
                                • Part of subcall function 00648B28: __getptd_noexit.LIBCMT ref: 00648B28
                              • __lock_file.LIBCMT ref: 006453EB
                                • Part of subcall function 00646C11: __lock.LIBCMT ref: 00646C34
                              • __fclose_nolock.LIBCMT ref: 006453F6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: f92e061af294de62b4a76010d45d046dce902e14a12e73332f6086d0aa5be167
                              • Instruction ID: a75bd8deb79e9fc797bc8fda98887e15e0eebc4887e7ffdf1a78df4b430d119d
                              • Opcode Fuzzy Hash: f92e061af294de62b4a76010d45d046dce902e14a12e73332f6086d0aa5be167
                              • Instruction Fuzzy Hash: CDF0F631C00A009FD7516F6488057ED6AE26F41374F20810CA421AB1C2DBBC49019B5A
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 016B4B7D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016B4BA1
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016B4BC3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                              • Instruction ID: 1e5a9e0a9230c888f77987ea46ff8a7882149fdb0b31eee54b063e6ee32bb246
                              • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                              • Instruction Fuzzy Hash: DC12CF24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F91CF5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 650b96cf7f6b7a4a8f8b94fe166782ae82308188674715cc4813a89efc446a3b
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 4A31C070A00115EBE718DF58D4C4AA9F7B6FB99300B6486A5E90ACB351DA31EDC2DBC0
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 1e52585e9a49481af360846c5ffe6d93771b85e36150a0aba6a5a9923ecda7a5
                              • Instruction ID: 1cfe8ab22770ac7eba9c563905ae5fae8942a71e4a6fdb365338184af58c5d7f
                              • Opcode Fuzzy Hash: 1e52585e9a49481af360846c5ffe6d93771b85e36150a0aba6a5a9923ecda7a5
                              • Instruction Fuzzy Hash: 644137746087518FDB24DF64C444B5ABBE2BF45318F0989ACE9998B362C372EC45CF52
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 3efc14475bded5e9e997421ffcdd80db02a2ab17949cef719348de52d857aad0
                              • Instruction ID: 100ca4d8e0787d4627d421356fbfe7a9d37471e222b01053829c39700cfc7ea2
                              • Opcode Fuzzy Hash: 3efc14475bded5e9e997421ffcdd80db02a2ab17949cef719348de52d857aad0
                              • Instruction Fuzzy Hash: D1214872A04A19EBDF188F11F841B697BB7FF14352F20846EE896C5190EB31C2D4CB05
                              APIs
                                • Part of subcall function 00624BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00624BEF
                                • Part of subcall function 0064525B: __wfsopen.LIBCMT ref: 00645266
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624E0F
                                • Part of subcall function 00624B6A: FreeLibrary.KERNEL32(00000000), ref: 00624BA4
                                • Part of subcall function 00624C70: _memmove.LIBCMT ref: 00624CBA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: deb2ba984f8831616f1ed231edb635e9657be15e12ead91718dfb03b5204bdb4
                              • Instruction ID: 050b9239aad463899c53fbdfae097e535bb66e2e02a92acada79f1c2b29e917c
                              • Opcode Fuzzy Hash: deb2ba984f8831616f1ed231edb635e9657be15e12ead91718dfb03b5204bdb4
                              • Instruction Fuzzy Hash: FE112731600616ABDF20BFB0D802FAD77ABAF84750F10842DF981AB1C1DE719A019F55
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: a68fba13633335e3e7e8410ab42f18bc96cd2220293bcc2651e0938421bb0908
                              • Instruction ID: fde2532e344238b964aa39466cbd90e5d17ae6310b308cad7352aa22fa3b95d0
                              • Opcode Fuzzy Hash: a68fba13633335e3e7e8410ab42f18bc96cd2220293bcc2651e0938421bb0908
                              • Instruction Fuzzy Hash: 14213374608711DFDB54DF64D444A5ABBE2BF88314F04896CF98A57722C731E805CF92
                              APIs
                              • __lock_file.LIBCMT ref: 006448A6
                                • Part of subcall function 00648B28: __getptd_noexit.LIBCMT ref: 00648B28
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: bb05233535a83c6bd24d326e55148122ed9878bb016c02bf2a3f248be5b24f09
                              • Instruction ID: 076d10c39cd11088528951e08e20e253db08e3e84a3a002739031fac43c501bd
                              • Opcode Fuzzy Hash: bb05233535a83c6bd24d326e55148122ed9878bb016c02bf2a3f248be5b24f09
                              • Instruction Fuzzy Hash: B2F0AF31D01609EFDF91AFA48C067EE36A3AF01325F158418F424AB292CF79C951DB55
                              APIs
                              • FreeLibrary.KERNEL32(?,?,006E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624E7E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: fd64f73aabe1eac26f939c94ba84d23ed9b8619f66e1dc2e93ac11e224bc71cd
                              • Instruction ID: 0a4ecd472823315ae5927982e468e21f12039798be9e4d20454c24e19b6b1482
                              • Opcode Fuzzy Hash: fd64f73aabe1eac26f939c94ba84d23ed9b8619f66e1dc2e93ac11e224bc71cd
                              • Instruction Fuzzy Hash: 2BF03071505B22CFDB349F64E494852B7E2BF14325311893EE2D786611CB319840DF40
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006407B0
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: 95a239556573a672e6cd437370dc0134c0ba770cf9a141992de6aca725ca25c5
                              • Instruction ID: ec3adca7736c76c051c676f17afa0440b2cf29f78130f2671d94fee8b5c7c832
                              • Opcode Fuzzy Hash: 95a239556573a672e6cd437370dc0134c0ba770cf9a141992de6aca725ca25c5
                              • Instruction Fuzzy Hash: 8CE0CD369051285BC720E6989C05FEA77DEDFC97A2F0441B9FC4CD7254D9A0AD808AD5
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction ID: 38e84488c2b2ab6ed4822b8426aaa1b0043ed3eb1cb7a577cc6985f5203754ad
                              • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction Fuzzy Hash: 5FE092B0104B045FD7389A24D800BE373E2AB05304F00091DF2AA93342EB6278418759
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: fa004094fc970d5c6ddd0c2c4e7e8aa8d25aa75cacfbe6f1c0cf079ebec05a64
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: AEB0927644020C77CF012A82EC02A4A3B1A9B41764F408021FB0C18162A6B3A6649A89
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 016B5361
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction ID: f176ec8f09312bf55f55131ab36109ecc4b9531a06e28b19e750f6861d17a1b9
                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction Fuzzy Hash: 0AE0BF7494110DEFDB00EFB4D9496DE7BB4EF04301F1005A1FD05D7681DB709E548A62
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 016B5361
                              Memory Dump Source
                              • Source File: 00000001.00000002.1280074208.00000000016B3000.00000040.00000020.00020000.00000000.sdmp, Offset: 016B3000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_16b3000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 2bf3e341384355db98d2440d26673342faa945f63eb26e685382c8f760790d19
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: 0CE0E67494110DDFDB00EFB4D9496DE7FB4EF04301F100161FD01D2281D6709D508A62
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 006ACB37
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006ACB95
                              • GetWindowLongW.USER32(?,000000F0), ref: 006ACBD6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006ACC00
                              • SendMessageW.USER32 ref: 006ACC29
                              • _wcsncpy.LIBCMT ref: 006ACC95
                              • GetKeyState.USER32(00000011), ref: 006ACCB6
                              • GetKeyState.USER32(00000009), ref: 006ACCC3
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 006ACCD9
                              • GetKeyState.USER32(00000010), ref: 006ACCE3
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 006ACD0C
                              • SendMessageW.USER32 ref: 006ACD33
                              • SendMessageW.USER32(?,00001030,?,006AB348), ref: 006ACE37
                              • SetCapture.USER32(?), ref: 006ACE69
                              • ClientToScreen.USER32(?,?), ref: 006ACECE
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006ACEF5
                              • ReleaseCapture.USER32 ref: 006ACF00
                              • GetCursorPos.USER32(?), ref: 006ACF3A
                              • ScreenToClient.USER32(?,?), ref: 006ACF47
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 006ACFA3
                              • SendMessageW.USER32 ref: 006ACFD1
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 006AD00E
                              • SendMessageW.USER32 ref: 006AD03D
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 006AD05E
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 006AD06D
                              • GetCursorPos.USER32(?), ref: 006AD08D
                              • ScreenToClient.USER32(?,?), ref: 006AD09A
                              • GetParent.USER32(?), ref: 006AD0BA
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 006AD123
                              • SendMessageW.USER32 ref: 006AD154
                              • ClientToScreen.USER32(?,?), ref: 006AD1B2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 006AD1E2
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 006AD20C
                              • SendMessageW.USER32 ref: 006AD22F
                              • ClientToScreen.USER32(?,?), ref: 006AD281
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 006AD2B5
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 006AD351
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 302779176-4164748364
                              • Opcode ID: 941b0674d2d1cb306d09e1648cc842d663b256ee8f7ef13c0da362ecaa7a1dc0
                              • Instruction ID: 986be0ccbf209f6b9b94e2b64cfdb6f8c4f5dcc7303815e5865f985e7a3633d0
                              • Opcode Fuzzy Hash: 941b0674d2d1cb306d09e1648cc842d663b256ee8f7ef13c0da362ecaa7a1dc0
                              • Instruction Fuzzy Hash: 04429D34204741AFDB24EF64C894AAABBE6FF4A320F141559F556872A1C732EC50DFA2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: 3cc$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_c
                              • API String ID: 1357608183-306146363
                              • Opcode ID: 36ee253df393f249322d5a2a75a45a124560239b6574e65f524b142246ffcbc3
                              • Instruction ID: c18d6c14ba57446e736c93a3c20881fd5751ba1544ede8f95f41f7aa676efb82
                              • Opcode Fuzzy Hash: 36ee253df393f249322d5a2a75a45a124560239b6574e65f524b142246ffcbc3
                              • Instruction Fuzzy Hash: 37939471A04216DFDB24CF58C8917EDB7B2FF48710F25816AE959AB381E7709D82DB80
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 006248DF
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0065D665
                              • IsIconic.USER32(?), ref: 0065D66E
                              • ShowWindow.USER32(?,00000009), ref: 0065D67B
                              • SetForegroundWindow.USER32(?), ref: 0065D685
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0065D69B
                              • GetCurrentThreadId.KERNEL32 ref: 0065D6A2
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0065D6AE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0065D6BF
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0065D6C7
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0065D6CF
                              • SetForegroundWindow.USER32(?), ref: 0065D6D2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065D6E7
                              • keybd_event.USER32(00000012,00000000), ref: 0065D6F2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065D6FC
                              • keybd_event.USER32(00000012,00000000), ref: 0065D701
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065D70A
                              • keybd_event.USER32(00000012,00000000), ref: 0065D70F
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0065D719
                              • keybd_event.USER32(00000012,00000000), ref: 0065D71E
                              • SetForegroundWindow.USER32(?), ref: 0065D721
                              • AttachThreadInput.USER32(?,?,00000000), ref: 0065D748
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: bbf39c45ba901beb20547f0c7c846a14cfb11c12b8f02a13f7727376b2f17adf
                              • Instruction ID: 87335f3673cc304410890a2259685392c2d2061225e1b65f9f76b75568c27818
                              • Opcode Fuzzy Hash: bbf39c45ba901beb20547f0c7c846a14cfb11c12b8f02a13f7727376b2f17adf
                              • Instruction Fuzzy Hash: 6A316271A40318BBEB306FA19C49FBF7E6EEB45B51F105025FA04EA1D1C6B06941AFA1
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0068C78D
                              • FindClose.KERNEL32(00000000), ref: 0068C7E1
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0068C806
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0068C81D
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0068C844
                              • __swprintf.LIBCMT ref: 0068C890
                              • __swprintf.LIBCMT ref: 0068C8D3
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • __swprintf.LIBCMT ref: 0068C927
                                • Part of subcall function 00643698: __woutput_l.LIBCMT ref: 006436F1
                              • __swprintf.LIBCMT ref: 0068C975
                                • Part of subcall function 00643698: __flsbuf.LIBCMT ref: 00643713
                                • Part of subcall function 00643698: __flsbuf.LIBCMT ref: 0064372B
                              • __swprintf.LIBCMT ref: 0068C9C4
                              • __swprintf.LIBCMT ref: 0068CA13
                              • __swprintf.LIBCMT ref: 0068CA62
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: 29e3699ffa9371f7b2c7dfda50e5a9ff8f097714f4c7f3e593a251636e6ada55
                              • Instruction ID: 1e57ff5922c3d59946d7cd9a5ee6d4f86a6302995002d86eb4f1ded3a1aea06e
                              • Opcode Fuzzy Hash: 29e3699ffa9371f7b2c7dfda50e5a9ff8f097714f4c7f3e593a251636e6ada55
                              • Instruction Fuzzy Hash: 80A14CB1408754ABC754EFA4D885DAFB7EEBF85700F40091EF58587291EA34EA08CF66
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 0068EFB6
                              • _wcscmp.LIBCMT ref: 0068EFCB
                              • _wcscmp.LIBCMT ref: 0068EFE2
                              • GetFileAttributesW.KERNEL32(?), ref: 0068EFF4
                              • SetFileAttributesW.KERNEL32(?,?), ref: 0068F00E
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0068F026
                              • FindClose.KERNEL32(00000000), ref: 0068F031
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0068F04D
                              • _wcscmp.LIBCMT ref: 0068F074
                              • _wcscmp.LIBCMT ref: 0068F08B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0068F09D
                              • SetCurrentDirectoryW.KERNEL32(006D8920), ref: 0068F0BB
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068F0C5
                              • FindClose.KERNEL32(00000000), ref: 0068F0D2
                              • FindClose.KERNEL32(00000000), ref: 0068F0E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: a3acdf50a8293074056b21372665cc9ef49ed089d1f54ec1dc3d2aa036dfb5d2
                              • Instruction ID: de321aaf10174b33b88985fc0624e67aaad5689d33ad1b4cab8a723cabfbe9f7
                              • Opcode Fuzzy Hash: a3acdf50a8293074056b21372665cc9ef49ed089d1f54ec1dc3d2aa036dfb5d2
                              • Instruction Fuzzy Hash: 8D31C3325012196EDB24BBE4DC68BEE77AE9F49360F100276E844E3291DB70EE44CF65
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A0953
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,006AF910,00000000,?,00000000,?,?), ref: 006A09C1
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006A0A09
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 006A0A92
                              • RegCloseKey.ADVAPI32(?), ref: 006A0DB2
                              • RegCloseKey.ADVAPI32(00000000), ref: 006A0DBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: 9325d6eb5e645ab0f3ae51ceaebbc45e48284ea5d43fe53ae1e629f1bf704eea
                              • Instruction ID: 750f0b418becac1ed9669e6ec1c1cfd5bfbce5dcb1933a695c4051dfb95ca51f
                              • Opcode Fuzzy Hash: 9325d6eb5e645ab0f3ae51ceaebbc45e48284ea5d43fe53ae1e629f1bf704eea
                              • Instruction Fuzzy Hash: 860258756006119FDB54EF24D851E6AB7E6EF8A310F04895CF88A9B3A2CB34EC01CF95
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • DragQueryPoint.SHELL32(?,?), ref: 006AC627
                                • Part of subcall function 006AAB37: ClientToScreen.USER32(?,?), ref: 006AAB60
                                • Part of subcall function 006AAB37: GetWindowRect.USER32(?,?), ref: 006AABD6
                                • Part of subcall function 006AAB37: PtInRect.USER32(?,?,006AC014), ref: 006AABE6
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 006AC690
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 006AC69B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 006AC6BE
                              • _wcscat.LIBCMT ref: 006AC6EE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 006AC705
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 006AC71E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 006AC735
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 006AC757
                              • DragFinish.SHELL32(?), ref: 006AC75E
                              • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 006AC851
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 2166380349-3440237614
                              • Opcode ID: 47ced03031d16209c941e9faa8f3bddb1d3217432054c2d96528dded8a16ad60
                              • Instruction ID: ccdab7b19303ff2898d43531e36a53e8efb80b241cfcbaad96540312aca76da2
                              • Opcode Fuzzy Hash: 47ced03031d16209c941e9faa8f3bddb1d3217432054c2d96528dded8a16ad60
                              • Instruction Fuzzy Hash: D4617D71508310AFC701EF64DC85D9FBBEAEF8A710F00092EF591962A1DB30A949CF96
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 0068F113
                              • _wcscmp.LIBCMT ref: 0068F128
                              • _wcscmp.LIBCMT ref: 0068F13F
                                • Part of subcall function 00684385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006843A0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0068F16E
                              • FindClose.KERNEL32(00000000), ref: 0068F179
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0068F195
                              • _wcscmp.LIBCMT ref: 0068F1BC
                              • _wcscmp.LIBCMT ref: 0068F1D3
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0068F1E5
                              • SetCurrentDirectoryW.KERNEL32(006D8920), ref: 0068F203
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068F20D
                              • FindClose.KERNEL32(00000000), ref: 0068F21A
                              • FindClose.KERNEL32(00000000), ref: 0068F22C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: ee05a906f35f036c6190e3c87307be7c2a8d5f826332decf6f9845efd0015f66
                              • Instruction ID: 7974f6a4d6cac6e3e302704899f47a14501a81253f436b1ba6d7baffb96d4e97
                              • Opcode Fuzzy Hash: ee05a906f35f036c6190e3c87307be7c2a8d5f826332decf6f9845efd0015f66
                              • Instruction Fuzzy Hash: FF31B7365001196ADB24BBE4EC69BEE77AE9F45360F100275E840E3290DB71DF45CF69
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0068A20F
                              • __swprintf.LIBCMT ref: 0068A231
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0068A26E
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0068A293
                              • _memset.LIBCMT ref: 0068A2B2
                              • _wcsncpy.LIBCMT ref: 0068A2EE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0068A323
                              • CloseHandle.KERNEL32(00000000), ref: 0068A32E
                              • RemoveDirectoryW.KERNEL32(?), ref: 0068A337
                              • CloseHandle.KERNEL32(00000000), ref: 0068A341
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: 37eaf9ba7bfb2f1cfb2a047dcf17b4597a2faf6d776a255b9a7c6162a0209963
                              • Instruction ID: fcffe27ce78eef8ad8b815bcb75d2104ec3e0259daf3175391aad20cd0c39c67
                              • Opcode Fuzzy Hash: 37eaf9ba7bfb2f1cfb2a047dcf17b4597a2faf6d776a255b9a7c6162a0209963
                              • Instruction Fuzzy Hash: F23182B1900109ABDB21AFE0DC49FEB77BEEF89740F1041B6F908D6250E77197448B65
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 006AC1FC
                              • GetFocus.USER32 ref: 006AC20C
                              • GetDlgCtrlID.USER32(00000000), ref: 006AC217
                              • _memset.LIBCMT ref: 006AC342
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 006AC36D
                              • GetMenuItemCount.USER32(?), ref: 006AC38D
                              • GetMenuItemID.USER32(?,00000000), ref: 006AC3A0
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 006AC3D4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 006AC41C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006AC454
                              • NtdllDialogWndProc_W.NTDLL(?,00000111,?,?,?,?,?,?,?), ref: 006AC489
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlDialogFocusLongMessageNtdllPostProc_RadioWindow_memset
                              • String ID: 0
                              • API String ID: 3616455698-4108050209
                              • Opcode ID: e29ea70dea41f72b0256ceccd54748d50f952c2fd02c233136b65a70162b67ec
                              • Instruction ID: b39775455dc34053daba38c6f11c0d09777bfd6e6d03142153016613aad768d8
                              • Opcode Fuzzy Hash: e29ea70dea41f72b0256ceccd54748d50f952c2fd02c233136b65a70162b67ec
                              • Instruction Fuzzy Hash: E1818D706083119FDB10EF54C894AABBBE6EF8A324F00492DF99597291D730DD05CF96
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID: 3cc$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$_c
                              • API String ID: 0-3822978975
                              • Opcode ID: 7185eb594d6550c741ccb442fa87501689a5bdaa84dc7aeac3d96e3bfd06d629
                              • Instruction ID: 27f9f0bc7a89536fda01e6cbb7e95314a78e8fa92e9e3d9a05187d704d222e79
                              • Opcode Fuzzy Hash: 7185eb594d6550c741ccb442fa87501689a5bdaa84dc7aeac3d96e3bfd06d629
                              • Instruction Fuzzy Hash: 62724E75E002199BDB14CF59C8807EEB7B6FF45710F14C16AE85AEB391EB709A81CB90
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00680097
                              • SetKeyboardState.USER32(?), ref: 00680102
                              • GetAsyncKeyState.USER32(000000A0), ref: 00680122
                              • GetKeyState.USER32(000000A0), ref: 00680139
                              • GetAsyncKeyState.USER32(000000A1), ref: 00680168
                              • GetKeyState.USER32(000000A1), ref: 00680179
                              • GetAsyncKeyState.USER32(00000011), ref: 006801A5
                              • GetKeyState.USER32(00000011), ref: 006801B3
                              • GetAsyncKeyState.USER32(00000012), ref: 006801DC
                              • GetKeyState.USER32(00000012), ref: 006801EA
                              • GetAsyncKeyState.USER32(0000005B), ref: 00680213
                              • GetKeyState.USER32(0000005B), ref: 00680221
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 3cb871cbbe6c2011070fd17f8bd263958b1ab48960c5a49f03cc37800a6d28d7
                              • Instruction ID: 5a0dd8819fec04189d7f1210d49a8cda484276dfb6b5277213693a18da0d93d5
                              • Opcode Fuzzy Hash: 3cb871cbbe6c2011070fd17f8bd263958b1ab48960c5a49f03cc37800a6d28d7
                              • Instruction Fuzzy Hash: 2351EF309047882DFB75FBA088557EABFB69F02380F084B9DD5C15A2C3DAA49B8CC751
                              APIs
                                • Part of subcall function 006A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0069FDAD,?,?), ref: 006A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A04AC
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 006A054B
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006A05E3
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 006A0822
                              • RegCloseKey.ADVAPI32(00000000), ref: 006A082F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: e39a751975b75391fa8ff5fff81b2f98180fc0ba48e6dcdb8041b680e32532b4
                              • Instruction ID: 2d8c01e566101d8bb66642186af8ecaf33dc0ce706c832f76569e91c1b2c2917
                              • Opcode Fuzzy Hash: e39a751975b75391fa8ff5fff81b2f98180fc0ba48e6dcdb8041b680e32532b4
                              • Instruction Fuzzy Hash: BAE16F31604210AFDB54EF24C895D6ABBE6FF8A314F04896DF44ADB261D631ED01CF96
                              APIs
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • CoInitialize.OLE32 ref: 00698403
                              • CoUninitialize.COMBASE ref: 0069840E
                              • CoCreateInstance.COMBASE(?,00000000,00000017,006B2BEC,?), ref: 0069846E
                              • IIDFromString.COMBASE(?,?), ref: 006984E1
                              • VariantInit.OLEAUT32(?), ref: 0069857B
                              • VariantClear.OLEAUT32(?), ref: 006985DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: f60117f5b366d3d0d3ae969b1a838bff738f2d2e45e2afb6ea710ea36f2928d9
                              • Instruction ID: a6792b1a7383dcf0688ef3e99ddf51e45fe68ae7f5cf11e7bf33e24963fd1fdb
                              • Opcode Fuzzy Hash: f60117f5b366d3d0d3ae969b1a838bff738f2d2e45e2afb6ea710ea36f2928d9
                              • Instruction Fuzzy Hash: E361E4706083129FCB50DF64C848F9EB7EAAF8A754F04441DF9859B691CB70ED49CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 2f90630026b1d4cfb62efc889aced2c212807af0f1a59aea9c7957acdce3e156
                              • Instruction ID: f230954eb73c96d8d22202b448384b548c6fc4f184fc89ad7db22e08cb86dfe8
                              • Opcode Fuzzy Hash: 2f90630026b1d4cfb62efc889aced2c212807af0f1a59aea9c7957acdce3e156
                              • Instruction Fuzzy Hash: 1821BF352006109FDB10AFA0EC09F697BAAFF46350F14802AF9469B2A1CB34BD02CF59
                              APIs
                                • Part of subcall function 00624750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00624743,?,?,006237AE,?), ref: 00624770
                                • Part of subcall function 00684A31: GetFileAttributesW.KERNEL32(?,0068370B), ref: 00684A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 006838A3
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0068394B
                              • MoveFileW.KERNEL32(?,?), ref: 0068395E
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0068397B
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0068399D
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006839B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: 276ea7a29092f5d63d1eeeaaa8d7a5bd17081b53ad3b433788ea5bb474dbf33d
                              • Instruction ID: 3733d9b24c8ccab10ce0b56a6b0bd1ae99f70bf4336b209bfece112356ef1f29
                              • Opcode Fuzzy Hash: 276ea7a29092f5d63d1eeeaaa8d7a5bd17081b53ad3b433788ea5bb474dbf33d
                              • Instruction Fuzzy Hash: DE517B3180556DAACF15FBA0E992DEDB77AAF11300F600269E40276291EF316F09CF65
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0068F440
                              • Sleep.KERNEL32(0000000A), ref: 0068F470
                              • _wcscmp.LIBCMT ref: 0068F484
                              • _wcscmp.LIBCMT ref: 0068F49F
                              • FindNextFileW.KERNEL32(?,?), ref: 0068F53D
                              • FindClose.KERNEL32(00000000), ref: 0068F553
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: 1c7e1f2eb6b5d1ce7dc17933c45ce49c19b910d89153e2aed0e3b2264a6ebf85
                              • Instruction ID: b740442d82ade455850f12482f1a6b90a974add97e1194d4b4b1074b9cbea8c3
                              • Opcode Fuzzy Hash: 1c7e1f2eb6b5d1ce7dc17933c45ce49c19b910d89153e2aed0e3b2264a6ebf85
                              • Instruction Fuzzy Hash: 5841B17190021A9FCF54EFA4DC49AEEBBB6FF15310F10456AE815A3291DB30AE85CF91
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • GetSystemMetrics.USER32(0000000F), ref: 006AD47C
                              • GetSystemMetrics.USER32(0000000F), ref: 006AD49C
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 006AD6D7
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006AD6F5
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006AD716
                              • ShowWindow.USER32(00000003,00000000), ref: 006AD735
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 006AD75A
                              • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 006AD77D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$DialogInvalidateLongMoveNtdllProc_RectShow
                              • String ID:
                              • API String ID: 830902736-0
                              • Opcode ID: dd68bdb146d324bf2e2db7cb47460d5a514dd7154d3341d19810a630dbeeeedd
                              • Instruction ID: 03200f7b08be2d556dde7ccaac994bc287486279fbefe6f930bf78ec17455b6e
                              • Opcode Fuzzy Hash: dd68bdb146d324bf2e2db7cb47460d5a514dd7154d3341d19810a630dbeeeedd
                              • Instruction Fuzzy Hash: 33B19A71600225ABDF18EF68C9857ED7BB2BF0A701F089069EC4A9B695D734AD50CF90
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID: 3cc$_c
                              • API String ID: 674341424-1111051329
                              • Opcode ID: c5bfea5f1f9fb9cbfce1c7670ea2a81dc75529a9fca11d7bd43366263f68932a
                              • Instruction ID: 47635ffd8e32e4914e44246dd2b81a931c9b9bfd4dfe3779e42c5961f5e77aeb
                              • Opcode Fuzzy Hash: c5bfea5f1f9fb9cbfce1c7670ea2a81dc75529a9fca11d7bd43366263f68932a
                              • Instruction Fuzzy Hash: 8F22BD716087109FD764DF24D881BAFB7E6AF84310F04492CF88A97392DB31EA45CB96
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0067E628
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($AddRef$InterfaceDispatch$QueryInterface$Release$|
                              • API String ID: 1659193697-2318614619
                              • Opcode ID: 39192d7be05cdc3d92c7f7dcf2e5a037861e6a83ca8f613d66f8501cb417c29a
                              • Instruction ID: 1331a9d4d8f13975597bf675d084e7b5d80082bbcd0354badf5745c8e2f5760c
                              • Opcode Fuzzy Hash: 39192d7be05cdc3d92c7f7dcf2e5a037861e6a83ca8f613d66f8501cb417c29a
                              • Instruction Fuzzy Hash: 87322575A007059FD728CF29C4819AAB7F2FF48310B15C4AEE99ADB3A1E771E941CB44
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 93b6aa0f353b039bd0b98147807972af6711bceb4a57fef92f53220a3c3cbf6e
                              • Instruction ID: cb22968637a3c9b65dc44b15d49a6064508418579f702fdc28ee8cde5fcaa765
                              • Opcode Fuzzy Hash: 93b6aa0f353b039bd0b98147807972af6711bceb4a57fef92f53220a3c3cbf6e
                              • Instruction Fuzzy Hash: 74129E70A00619DFDF14DFA5D981AEEB7F6FF48300F108569E406E7290EB35A911CBA5
                              APIs
                                • Part of subcall function 00624750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00624743,?,?,006237AE,?), ref: 00624770
                                • Part of subcall function 00684A31: GetFileAttributesW.KERNEL32(?,0068370B), ref: 00684A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 00683B89
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00683BD9
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00683BEA
                              • FindClose.KERNEL32(00000000), ref: 00683C01
                              • FindClose.KERNEL32(00000000), ref: 00683C0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                              • String ID: \*.*
                              • API String ID: 2649000838-1173974218
                              • Opcode ID: 2473279fb88aedb8691a68b996a273f17fd13ef586425509dec30b7462f39c2f
                              • Instruction ID: 3857f9bcd2fa889c4fbb542cf027624e963a76cebb0299d4dab145774633795c
                              • Opcode Fuzzy Hash: 2473279fb88aedb8691a68b996a273f17fd13ef586425509dec30b7462f39c2f
                              • Instruction Fuzzy Hash: F63192710087959FC340FF64D891DAFB7EAAE92310F404E1DF4D592291EB21DA09CB67
                              APIs
                                • Part of subcall function 006787E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0067882B
                                • Part of subcall function 006787E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00678858
                                • Part of subcall function 006787E1: GetLastError.KERNEL32 ref: 00678865
                              • ExitWindowsEx.USER32(?,00000000), ref: 006851F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: 1400f7a833b8e2beccd5dd053696030a7f14718961e0c640d84628a3c25578ec
                              • Instruction ID: 25c64bdfecc8b5333dd49ca332beb94cbebd654d3aebbb5dced0e94f7d60b559
                              • Opcode Fuzzy Hash: 1400f7a833b8e2beccd5dd053696030a7f14718961e0c640d84628a3c25578ec
                              • Instruction Fuzzy Hash: 04014C316A16116BE72873649CBAFFA725BE705340F100625F843E21D2DD511D014790
                              APIs
                              • socket.WS2_32(00000002,00000001,00000006), ref: 006962DC
                              • WSAGetLastError.WS2_32(00000000), ref: 006962EB
                              • bind.WS2_32(00000000,?,00000010), ref: 00696307
                              • listen.WS2_32(00000000,00000005), ref: 00696316
                              • WSAGetLastError.WS2_32(00000000), ref: 00696330
                              • closesocket.WS2_32(00000000), ref: 00696344
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: 489d8d91019ffb36e52b72cfe4b380acd614d2c158f42a97e5e48d09d693fba2
                              • Instruction ID: 4042f3219d4c5c8ae0888f8acc0b8054f212a14f338d2fd83f02bb1f822a7885
                              • Opcode Fuzzy Hash: 489d8d91019ffb36e52b72cfe4b380acd614d2c158f42a97e5e48d09d693fba2
                              • Instruction Fuzzy Hash: B421D0316006109FCF10EF64D885AAEB7BAEF49720F148159F856A73D1C770AD01CF65
                              APIs
                                • Part of subcall function 00640DB6: std::exception::exception.LIBCMT ref: 00640DEC
                                • Part of subcall function 00640DB6: __CxxThrowException@8.LIBCMT ref: 00640E01
                              • _memmove.LIBCMT ref: 00670258
                              • _memmove.LIBCMT ref: 0067036D
                              • _memmove.LIBCMT ref: 00670414
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 7f84084d6c90706efbbbccf4bdbb7efae551ca13fd0c6a3c512434ebc6cc88d9
                              • Instruction ID: b6edbaf0e7b69a209991ad3efe746118b8eda1f47653486112c7922fd9918700
                              • Opcode Fuzzy Hash: 7f84084d6c90706efbbbccf4bdbb7efae551ca13fd0c6a3c512434ebc6cc88d9
                              • Instruction Fuzzy Hash: A002BEB0E00619DBDF04DF64D982AAEBBB6EF44310F14806DE80ADB355EB31D951CBA5
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 006219FA
                              • GetSysColor.USER32(0000000F), ref: 00621A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00621A61
                                • Part of subcall function 00621290: NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 006212D8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ColorDialogNtdllProc_$LongWindow
                              • String ID:
                              • API String ID: 591255283-0
                              • Opcode ID: 4d7db3f8fdcec27df5c970f924951c12f1526bcfef8441fc5a51c1bba8cc913b
                              • Instruction ID: faeff168ff9b75a139425bad54b8c4576929e4ff0c493328893a5ba204c6c130
                              • Opcode Fuzzy Hash: 4d7db3f8fdcec27df5c970f924951c12f1526bcfef8441fc5a51c1bba8cc913b
                              • Instruction Fuzzy Hash: 4CA17B7110AD74BAD738AB286C44EFF255FDB63342F14110DF902DD292CA229D429EB6
                              APIs
                                • Part of subcall function 00697D8B: inet_addr.WS2_32(00000000), ref: 00697DB6
                              • socket.WS2_32(00000002,00000002,00000011), ref: 0069679E
                              • WSAGetLastError.WS2_32(00000000), ref: 006967C7
                              • bind.WS2_32(00000000,?,00000010), ref: 00696800
                              • WSAGetLastError.WS2_32(00000000), ref: 0069680D
                              • closesocket.WS2_32(00000000), ref: 00696821
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: a28e6d754a37a50409111d0ecfe43d4e86240e6beec038aee65eb287b52e8d0f
                              • Instruction ID: bf53088007ccbb7b12e9cd5c36deef3fb27dd9cfaa337f4ffbafdfbd6c30f697
                              • Opcode Fuzzy Hash: a28e6d754a37a50409111d0ecfe43d4e86240e6beec038aee65eb287b52e8d0f
                              • Instruction Fuzzy Hash: 94410471A00620AFDB90BF64DC82F6E77AADF85714F04845CF905AB3C2CA74AD008BA5
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 8d111d8623f9844e3cdab36536d08a3b85ea91dd4e910d9bacc374c0e842bfba
                              • Instruction ID: ae51b62b2a59e743e7c66cc1a0a470ff3d1baf3f1b343cacd100d1df4dfb431a
                              • Opcode Fuzzy Hash: 8d111d8623f9844e3cdab36536d08a3b85ea91dd4e910d9bacc374c0e842bfba
                              • Instruction Fuzzy Hash: 0111E6317009215FDB20BF269C44A5A7BDBEF867A1B004428F846D3241DB74EC018EA5
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006780C0
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006780CA
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006780D9
                              • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 006780E0
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006780F6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: 0a4d714d98111095989e475b630a1c351074ec31852dc77e19cf99b9786094bf
                              • Instruction ID: 693a533e1b189f4335193aaed69cbcdbd547f92f25451012b6f6290cdb2b6bc0
                              • Opcode Fuzzy Hash: 0a4d714d98111095989e475b630a1c351074ec31852dc77e19cf99b9786094bf
                              • Instruction Fuzzy Hash: 57F06231250205AFEB101FA5EC8DEA73BAEEF4A755B404025F949C7250CB61AC51DE61
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0069EE3D
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0069EE4B
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • Process32NextW.KERNEL32(00000000,?), ref: 0069EF0B
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0069EF1A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: fded3e8f5e42064d8087eadd2d6110423d121a48dc4408423e969c90dd232067
                              • Instruction ID: b97fc837f94d51839cb7af8b7dc567af98284886db40a3460e9365fd18e3bcaa
                              • Opcode Fuzzy Hash: fded3e8f5e42064d8087eadd2d6110423d121a48dc4408423e969c90dd232067
                              • Instruction Fuzzy Hash: D4519D71504711AFD760EF20DC81EABB7E9EF84710F40482DF495972A1EB30A908CB96
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • GetCursorPos.USER32(?), ref: 006AC4D2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0065B9AB,?,?,?,?,?), ref: 006AC4E7
                              • GetCursorPos.USER32(?), ref: 006AC534
                              • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,0065B9AB,?,?,?), ref: 006AC56E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                              • String ID:
                              • API String ID: 1423138444-0
                              • Opcode ID: 963b8fe837a3880aaa7304535635ef8617bc4ebdb380dd62df07a25f873a8338
                              • Instruction ID: c1b9f3ab19061e9d2ef5b60c6ed9d4f6a1ac3be79b15b3b12a1bc79f7676698c
                              • Opcode Fuzzy Hash: 963b8fe837a3880aaa7304535635ef8617bc4ebdb380dd62df07a25f873a8338
                              • Instruction Fuzzy Hash: 77316435900558EFCB159F58C854DEA7BB7EF0A320F444159F9058B361C7316D61DF94
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006785E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 006785E9
                              • CloseHandle.KERNEL32(00000004), ref: 00678603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00678632
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 2621361867-0
                              • Opcode ID: 3b8057cb75608b99c534bb8ef083008e17fe207b56640a301da7e04e80f25262
                              • Instruction ID: 6faf70bbdd9a557b40bfa5e3aaf41a3b9616d1591da416bcf9bd1506a09c318f
                              • Opcode Fuzzy Hash: 3b8057cb75608b99c534bb8ef083008e17fe207b56640a301da7e04e80f25262
                              • Instruction Fuzzy Hash: 6D115C72540209AFDF019FE4ED49FDE7BAAEF49304F048064FE04A2160C7719E61DB61
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 006212D8
                              • GetClientRect.USER32(?,?), ref: 0065B5FB
                              • GetCursorPos.USER32(?), ref: 0065B605
                              • ScreenToClient.USER32(?,?), ref: 0065B610
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Client$CursorDialogLongNtdllProc_RectScreenWindow
                              • String ID:
                              • API String ID: 1010295502-0
                              • Opcode ID: 804f2d8f64e3d91cd661ae10e84bbb59f721d1aead2e720422563cb2dc371d18
                              • Instruction ID: 2965535efb183e7c999a56ead333c13767287fc14209edb849e63819c14c6685
                              • Opcode Fuzzy Hash: 804f2d8f64e3d91cd661ae10e84bbb59f721d1aead2e720422563cb2dc371d18
                              • Instruction Fuzzy Hash: C6116D35905429EFCB10EFA4E8859EE77BAEB16300F000455F901EB241C730BA918FA9
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0069180A,00000000), ref: 006923E1
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00692418
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: c246d72c4b25583d4acc70b79037e28e74b9fbcf0098711baeddf3190c73d092
                              • Instruction ID: 834ce1e1606ca1ce3eefd7eaae75ce4f809f3b569b2a10a01df4a4818d93de8c
                              • Opcode Fuzzy Hash: c246d72c4b25583d4acc70b79037e28e74b9fbcf0098711baeddf3190c73d092
                              • Instruction Fuzzy Hash: 3041F47190420AFFEF109E95DC91EFB77FEEB40724F10402EF601A7A41DA749E419A64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0068B343
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0068B39D
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0068B3EA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 0c8c221e0a97fd63c0a6044dd866f2c6dfbed8e653b3dbc49395588b08e8869c
                              • Instruction ID: 3833add588da5c78f85cf63d6762cdcb7a7be24985f0665602ae664cd95440a1
                              • Opcode Fuzzy Hash: 0c8c221e0a97fd63c0a6044dd866f2c6dfbed8e653b3dbc49395588b08e8869c
                              • Instruction Fuzzy Hash: C5217135A00518EFCB40EFA5D881AEDBBB9FF49310F1481AAE905AB351CB31AD15CF55
                              APIs
                                • Part of subcall function 00640DB6: std::exception::exception.LIBCMT ref: 00640DEC
                                • Part of subcall function 00640DB6: __CxxThrowException@8.LIBCMT ref: 00640E01
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0067882B
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00678858
                              • GetLastError.KERNEL32 ref: 00678865
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: 147a119ff96790b77a68d8a51b1e8ab944c380eae6367dfdeba834b63c7e2223
                              • Instruction ID: 0e23f590f1be0bffb7e5c1c468c98c0c3e29b1e6f0874d1d01a8f0e0d70c7873
                              • Opcode Fuzzy Hash: 147a119ff96790b77a68d8a51b1e8ab944c380eae6367dfdeba834b63c7e2223
                              • Instruction Fuzzy Hash: 891160B1814205AFE718EFA4DC89D6BB7BEEB45711B10852EE45997241DA30BC418B61
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00678774
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0067878B
                              • FreeSid.ADVAPI32(?), ref: 0067879B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 22efc697dd797eb4ea8c907821d7c49fae9a281ffd72cac6305375a69a442b0d
                              • Instruction ID: bb3e5bea1fadbf6f54a43a76dad685fb08a76221dec83287593931da9d038ef2
                              • Opcode Fuzzy Hash: 22efc697dd797eb4ea8c907821d7c49fae9a281ffd72cac6305375a69a442b0d
                              • Instruction Fuzzy Hash: 6EF0627595130CBFDF04DFF4DC99ABEB7BDEF08201F104469A501E2181E7716A448B51
                              APIs
                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00684CB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID: DOWN
                              • API String ID: 2434400541-711622031
                              • Opcode ID: 828314e25f05694378d3a9be8e98c36853be3e300bf3a5635d11cd2b81f5651c
                              • Instruction ID: ee1292a4b23fbcfb49e19a7789321ee64de74d021163498b0183dba15f5004f9
                              • Opcode Fuzzy Hash: 828314e25f05694378d3a9be8e98c36853be3e300bf3a5635d11cd2b81f5651c
                              • Instruction Fuzzy Hash: 74E0867159D7233DBA443519BC03EF7074E8F123357620207F810E51C1DD516C8225AD
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              • GetParent.USER32(?), ref: 0065B7BA
                              • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?,?,?,?,?,006219B3,?,?,?,00000006,?), ref: 0065B834
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LongWindow$DialogNtdllParentProc_
                              • String ID:
                              • API String ID: 314495775-0
                              • Opcode ID: a717e1de8e747c960177ab074904d4f174d2b1cf13a6cc1be8010d4e5ce72cde
                              • Instruction ID: 92b3d01995891e90c903c49c553059f33ee3684b18bd92cc18af715ab8d81ec0
                              • Opcode Fuzzy Hash: a717e1de8e747c960177ab074904d4f174d2b1cf13a6cc1be8010d4e5ce72cde
                              • Instruction Fuzzy Hash: 9621D234205964AFCB209F28E884DE93B97AF9A320F545254F9265F3B1C7319D12DF50
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0068C6FB
                              • FindClose.KERNEL32(00000000), ref: 0068C72B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: d81f0684eaa7da961d0062bdd1e5a2f7f3701c72f29973704b21275a40e52698
                              • Instruction ID: 8068ac7247e668a6181c6f30f4b11e9d4d91e5f980502d48ca1567f20c119147
                              • Opcode Fuzzy Hash: d81f0684eaa7da961d0062bdd1e5a2f7f3701c72f29973704b21275a40e52698
                              • Instruction Fuzzy Hash: 1411A1726006009FDB10EF29D845A6AF7EAFF85320F048A1DF8A9C7290DB34AC01CF95
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0065B93A,?,?,?), ref: 006AC5F1
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 006AC5D7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LongWindow$DialogMessageNtdllProc_Send
                              • String ID:
                              • API String ID: 1273190321-0
                              • Opcode ID: 5ccce7a5a9620126dc0f9ba2eb6999e6c572082262af21b5cff88201826524ba
                              • Instruction ID: 58a29a6b73c468cbc17f7c3ebd51b9bae721d16a390dbe44a3609781d7225496
                              • Opcode Fuzzy Hash: 5ccce7a5a9620126dc0f9ba2eb6999e6c572082262af21b5cff88201826524ba
                              • Instruction Fuzzy Hash: 56019E31200614EBCB25AF54DC94E6A3BA7FF86364F140128F9521B2A0CB72AC62DF91
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 006AC961
                              • NtdllDialogWndProc_W.NTDLL(?,00000200,?,?,?,?,?,?,?,0065BA16,?,?,?,?,?), ref: 006AC98A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClientDialogNtdllProc_Screen
                              • String ID:
                              • API String ID: 3420055661-0
                              • Opcode ID: 078f2dd9f196292f5406a9819b3c0a029925fc606f8dd901ae0efca8d1aa581e
                              • Instruction ID: f231702870b6ca7119959f30204b8dd114208f1e019034ac7e17e379cf29d141
                              • Opcode Fuzzy Hash: 078f2dd9f196292f5406a9819b3c0a029925fc606f8dd901ae0efca8d1aa581e
                              • Instruction Fuzzy Hash: F4F01772410218FFEB04AF85DC099AE7BBAFB49321F00416AF901A2161D3716A60EBA5
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00699468,?,006AFB84,?), ref: 0068A097
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00699468,?,006AFB84,?), ref: 0068A0A9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: 19f84824898e9964ce11a25e310f8892f3b32a1ef4578ba5a3cbf8f79c549977
                              • Instruction ID: f5ff519ee92c63b167c25aa6500bf4ef5dbc3eec0c7187a665eb4fe78ee0a4a0
                              • Opcode Fuzzy Hash: 19f84824898e9964ce11a25e310f8892f3b32a1ef4578ba5a3cbf8f79c549977
                              • Instruction Fuzzy Hash: B0F0E93510422DABDB10AFD4CC48FEA736EBF09361F004256FC04D6140C630A500CFE1
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 006ACA84
                              • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,0065B995,?,?,?,?), ref: 006ACAB2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: ecb75c2fe9998e5e058c89253ec280def36643b454bb1e0e9b0626c6df651d99
                              • Instruction ID: e204feb31e097cd15de55e4cfb73939c6ab9e9e460f2d344daa7b49ebacd5d0c
                              • Opcode Fuzzy Hash: ecb75c2fe9998e5e058c89253ec280def36643b454bb1e0e9b0626c6df651d99
                              • Instruction Fuzzy Hash: E4E08670100218BFEB14AF19DC0AFBA3B55EB05761F408115F99AD91E1C771AC50DB60
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00678309), ref: 006781E0
                              • CloseHandle.KERNEL32(?,?,00678309), ref: 006781F2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: ae90cd7a0bb9be606ccd9090c21a7d530f1909547305b5064eb9660991a2a5bd
                              • Instruction ID: 62815808077e595aa617472191200284d5214ba8792d51cd61b47b1295825711
                              • Opcode Fuzzy Hash: ae90cd7a0bb9be606ccd9090c21a7d530f1909547305b5064eb9660991a2a5bd
                              • Instruction Fuzzy Hash: AFE08C32010621AFFB212B61EC08DB3BBEBEF00310710882DF9A680430CB32ACA0DB10
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,006B4178,00648D57,t of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.,?,?,00000001), ref: 0064A15A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0064A163
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: b24af25b72076449e2fd8c1f451b728a956d4323268f5cacef8b6b492d247c47
                              • Instruction ID: 5c85b47a9ca5b165b631710f4af02afe2340066ed290384afa5387285e4f0ed4
                              • Opcode Fuzzy Hash: b24af25b72076449e2fd8c1f451b728a956d4323268f5cacef8b6b492d247c47
                              • Instruction Fuzzy Hash: 6FB09231054208ABCF003BD1EC59B883F6AEB46AA2F405020F60D84060CFA264508ED2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 63008b15ba1aecddb184ce8883c4bf4e67c9e11081837e19bffc2b8bab8c42e6
                              • Instruction ID: ddaef724272d092e47cd2b1426fe5def5c73f0ee84965b44d53b7c8008676c9f
                              • Opcode Fuzzy Hash: 63008b15ba1aecddb184ce8883c4bf4e67c9e11081837e19bffc2b8bab8c42e6
                              • Instruction Fuzzy Hash: 0D32E461D29F414DDB239A34D872336A24AAFB73C4F15E737E819B5EA6EB29C4C34100
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1a6796f2c6ef5f5173263e5ef29dbede143c0688f7cb9bd0078eac47621ad5c4
                              • Instruction ID: 280b5d0a0bf33eddfe433385776f787f10bdc3be5e72fefabc78cf23e0630212
                              • Opcode Fuzzy Hash: 1a6796f2c6ef5f5173263e5ef29dbede143c0688f7cb9bd0078eac47621ad5c4
                              • Instruction Fuzzy Hash: 1EB1BA70E2AF414DD32396398831336BA9DAFBB2C5F51E71BFC2670922EB2185C34141
                              APIs
                              • __time64.LIBCMT ref: 0068889B
                                • Part of subcall function 0064520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00688F6E,00000000,?,?,?,?,0068911F,00000000,?), ref: 00645213
                                • Part of subcall function 0064520A: __aulldiv.LIBCMT ref: 00645233
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: cb349e4aa9173988cb6ace2780222855c3bb3f0f1af3f8c23a4bea9512741900
                              • Instruction ID: de293552aa6530720e89f862100e18f30baac968aa5f1322bffb7d0ce4664a55
                              • Opcode Fuzzy Hash: cb349e4aa9173988cb6ace2780222855c3bb3f0f1af3f8c23a4bea9512741900
                              • Instruction Fuzzy Hash: F421A2726256108FC729CF25D881A92B3E2EBA5311B688F6CE1F5CF2C0CA74A905CB54
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,00000112,?,00000000), ref: 006AD838
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 9a629441da633a625b75160a6ab666d086b2694eb77a00b3639d3de5b25e4a97
                              • Instruction ID: 59b3a4fae746e19ee19f220ea8b21cc4e3e6725743e9fff06ad18d5751b34186
                              • Opcode Fuzzy Hash: 9a629441da633a625b75160a6ab666d086b2694eb77a00b3639d3de5b25e4a97
                              • Instruction Fuzzy Hash: 4F113D34200255BBFB297E2CCC45FBA3B57D743B20F204318F5235AAD2CA649D019FA4
                              APIs
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,0065B952,?,?,?,?,00000000,?), ref: 006AD432
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 5d5a81a960e45ccc0222bca2be06f1f2c90448f1b8401cd03096e233e4da6eb7
                              • Instruction ID: 4d15f82e732dcfa26a5f004dbd5c0fec86aa79be2a3839f63a3d42d5362233b0
                              • Opcode Fuzzy Hash: 5d5a81a960e45ccc0222bca2be06f1f2c90448f1b8401cd03096e233e4da6eb7
                              • Instruction Fuzzy Hash: 4E01F531600514AFDF14AF25C849AEA3BD3EF5B365F444164F9075B691C330BC129FA0
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,00000006,00000000,?,?,?,00621B04,?,?,?,?,?), ref: 006218E2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 8d7845fdac8e41b847907ce699ad12fb034726b659ab48f27616518c21ee6778
                              • Instruction ID: b042a278d2763d440de000b8863f5346c88c180ff1581d6d109e0a7449f74182
                              • Opcode Fuzzy Hash: 8d7845fdac8e41b847907ce699ad12fb034726b659ab48f27616518c21ee6778
                              • Instruction Fuzzy Hash: 0DF05E34600A69EFDF18DF15E8909663BA3EB55350F505129F9524F3E1C731D960EF50
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 006AC8FE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 82d3d38e954069a6bfa093f5a720de8ce74144eab9a47e2bdc5005239a52a7de
                              • Instruction ID: 394583d8d432c11db22e4bda1f8bb2cdd371257ab5a22668a2d2613cb9a26f6a
                              • Opcode Fuzzy Hash: 82d3d38e954069a6bfa093f5a720de8ce74144eab9a47e2bdc5005239a52a7de
                              • Instruction Fuzzy Hash: 11F03935201294ABDB21AF58DC45FC63B96AB0A320F044018BA22672E2CA706C20EBA0
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00678389), ref: 006787D1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: a160111d4390295db2277937de674a0e445223d3a9b6d0c1fa73d2d122585ac6
                              • Instruction ID: 47a9b81596f014605f68be65e8699609b4d55a97aa46cd00c40cc4b43bcce695
                              • Opcode Fuzzy Hash: a160111d4390295db2277937de674a0e445223d3a9b6d0c1fa73d2d122585ac6
                              • Instruction Fuzzy Hash: 73D05E322A050EABEF019FA4DC01EAE3B6AEB04B01F408111FE15C50A1C775E835AF60
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,0065B9BC,?,?,?,?,?,?), ref: 006AC934
                                • Part of subcall function 006AB635: _memset.LIBCMT ref: 006AB644
                                • Part of subcall function 006AB635: _memset.LIBCMT ref: 006AB653
                                • Part of subcall function 006AB635: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006E6F20,006E6F64), ref: 006AB682
                                • Part of subcall function 006AB635: CloseHandle.KERNEL32 ref: 006AB694
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateDialogHandleNtdllProc_Process
                              • String ID:
                              • API String ID: 2364484715-0
                              • Opcode ID: ee79a371b2c867caf37b144911ae4dbe3706c36c45558d5bc3ab0847ceb9181c
                              • Instruction ID: 2495a3a52192385fa25288890b436dba59606745a29812bd9a959d360334c06e
                              • Opcode Fuzzy Hash: ee79a371b2c867caf37b144911ae4dbe3706c36c45558d5bc3ab0847ceb9181c
                              • Instruction Fuzzy Hash: 5BE04631110208EFCB01AF44DD54E8637B2FB1D314F018054FA061B2B2C731AC20EF50
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?,?,00621AEE,?,?,?), ref: 006216AB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: fd60461aad62051f3cd883bc76a81f4dbd0fb49f5f4f18ea1fb5a8340094586d
                              • Instruction ID: 7407a6da2a96b2690b4b8a0e2011f90db4201e0ec80c07b3f9ffe752d28d7934
                              • Opcode Fuzzy Hash: fd60461aad62051f3cd883bc76a81f4dbd0fb49f5f4f18ea1fb5a8340094586d
                              • Instruction Fuzzy Hash: 38E0EC35500618FBCF55AF90DC61E653B27FB59314F508418FA560A2A1CA72A921EF54
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 006AC885
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 652927c701c8d45328bae22d39d57cd98a16e7981a25a869ed5bcbaed9df272a
                              • Instruction ID: b499c78d5b98f3e546ebb14422b6eda2c2d5a022dfc596d0dd00ca2b9dad553e
                              • Opcode Fuzzy Hash: 652927c701c8d45328bae22d39d57cd98a16e7981a25a869ed5bcbaed9df272a
                              • Instruction Fuzzy Hash: 95E0E235200248EFCB01EF88D884E863BA6AB1D300F004054FA154B262C771A820EBA2
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 006AC8B4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 47d302e6e11e244d262289e86fb31b79ce59a4d5b9edd97bb4dfe39c7dff653d
                              • Instruction ID: b04fe3c7eca2b8974784aa9f5c15f8891e4f4b6d10ebd285a667765d2b5118ed
                              • Opcode Fuzzy Hash: 47d302e6e11e244d262289e86fb31b79ce59a4d5b9edd97bb4dfe39c7dff653d
                              • Instruction Fuzzy Hash: C5E0E235200248EFCB01EF88D984D863BA6AB1D300F004054FA154B262C771A820EBA2
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                                • Part of subcall function 0062201B: DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006220D3
                                • Part of subcall function 0062201B: KillTimer.USER32(-00000001,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0062216E
                              • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?,?,00621AE2,?,?), ref: 006216D4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                              • String ID:
                              • API String ID: 2797419724-0
                              • Opcode ID: a1ad52b37c3f3183b79d7fb223b70ca8ccd04d660b3b13f33dd7404c27c1ad85
                              • Instruction ID: 79d2b5770a5c2dbbe52ac8e7f6cb6f9e8225fc1ffe91671f7f944c76c8b8ccd2
                              • Opcode Fuzzy Hash: a1ad52b37c3f3183b79d7fb223b70ca8ccd04d660b3b13f33dd7404c27c1ad85
                              • Instruction Fuzzy Hash: F0D01231140718B7DF603FA1EC27F493E1B9B14750F408024BA05291D3CAB16860AD9D
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0064A12A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 6d16c002c506000ceb37ec727f433fe47e4454512ee7840c44290adaaff0518b
                              • Instruction ID: e300dd6a5b13f515c8a84b0e758eabf73ea11fd834e5986c6950148cfd82a771
                              • Opcode Fuzzy Hash: 6d16c002c506000ceb37ec727f433fe47e4454512ee7840c44290adaaff0518b
                              • Instruction Fuzzy Hash: CDA0113000020CAB8F002B82EC08888BFAEEA022A0B008020F80C800228F32A8208AC2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dcd5a254887f47057ee6968f5f078f7e442e2c11c01491fab1cb9dd57a0ba2fb
                              • Instruction ID: 246951586eaf2439ca79f15fb6dcb923c755483534b6ea7ad904e759a5e572b6
                              • Opcode Fuzzy Hash: dcd5a254887f47057ee6968f5f078f7e442e2c11c01491fab1cb9dd57a0ba2fb
                              • Instruction Fuzzy Hash: AA220530904746CFDF288A28C4947FC77A3BF41344F6884ABF55B8B692DBB59D92C681
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: ae4fe0fd873fa7a884c89b321d7d76871539e4cf40f3127c22826bfb6e533cae
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: 69C187722051930ADF2D4639C4741BEFBA25EA37B136A176DE4B3CF2D4EE10C965D620
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: a168225eb0bd01bc25da4bf21ab147a38efa5dc0616a686ab970245bca2b674d
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 5DC196722051930ADF2D463AC4340BEFAA25FA37F136A176DE4B2DF2D4EE10C965D620
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: e12f5ce5b683bbb4b119713cd0ba5f0fb807521bcd671b2aff8a29280af4d232
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 59C193726451930ADF2D4639C4741BEBBA29EA37B131A176DD4B3CF2C4FE20C9A5D620
                              APIs
                              • CharUpperBuffW.USER32(?,?,006AF910), ref: 006A3627
                              • IsWindowVisible.USER32(?), ref: 006A364B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: 85768dfed861528fa7e46164a6fce3f091a39b0e04ad4a7a4463b88238f6a10c
                              • Instruction ID: cf38481ca74d5c298a172d8afb5864186752dbbb5a2fdb960d52075956ebd6e7
                              • Opcode Fuzzy Hash: 85768dfed861528fa7e46164a6fce3f091a39b0e04ad4a7a4463b88238f6a10c
                              • Instruction Fuzzy Hash: 2CD16E302043219BDB44FF10C455AAE7BA3AF96344F14485DF98A5B3A2DB31EE4ACF95
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 006AA630
                              • GetSysColorBrush.USER32(0000000F), ref: 006AA661
                              • GetSysColor.USER32(0000000F), ref: 006AA66D
                              • SetBkColor.GDI32(?,000000FF), ref: 006AA687
                              • SelectObject.GDI32(?,00000000), ref: 006AA696
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 006AA6C1
                              • GetSysColor.USER32(00000010), ref: 006AA6C9
                              • CreateSolidBrush.GDI32(00000000), ref: 006AA6D0
                              • FrameRect.USER32(?,?,00000000), ref: 006AA6DF
                              • DeleteObject.GDI32(00000000), ref: 006AA6E6
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 006AA731
                              • FillRect.USER32(?,?,00000000), ref: 006AA763
                              • GetWindowLongW.USER32(?,000000F0), ref: 006AA78E
                                • Part of subcall function 006AA8CA: GetSysColor.USER32(00000012), ref: 006AA903
                                • Part of subcall function 006AA8CA: SetTextColor.GDI32(?,?), ref: 006AA907
                                • Part of subcall function 006AA8CA: GetSysColorBrush.USER32(0000000F), ref: 006AA91D
                                • Part of subcall function 006AA8CA: GetSysColor.USER32(0000000F), ref: 006AA928
                                • Part of subcall function 006AA8CA: GetSysColor.USER32(00000011), ref: 006AA945
                                • Part of subcall function 006AA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 006AA953
                                • Part of subcall function 006AA8CA: SelectObject.GDI32(?,00000000), ref: 006AA964
                                • Part of subcall function 006AA8CA: SetBkColor.GDI32(?,00000000), ref: 006AA96D
                                • Part of subcall function 006AA8CA: SelectObject.GDI32(?,?), ref: 006AA97A
                                • Part of subcall function 006AA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 006AA999
                                • Part of subcall function 006AA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006AA9B0
                                • Part of subcall function 006AA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 006AA9C5
                                • Part of subcall function 006AA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006AA9ED
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                              • String ID:
                              • API String ID: 3521893082-0
                              • Opcode ID: 6cc656e380c322c5ce6ed964c8fb3f64005d1194c9e3488f5db92b677c18892e
                              • Instruction ID: f23764b3cf9f5517e087d6828e1e62b892ca5e54a83281f393cf51e02c95bcd7
                              • Opcode Fuzzy Hash: 6cc656e380c322c5ce6ed964c8fb3f64005d1194c9e3488f5db92b677c18892e
                              • Instruction Fuzzy Hash: 96917071408301FFD710AFA4DC08A5BBBAAFF4A321F105B2AF5A2961A1D771E945CF52
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 006974DE
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0069759D
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 006975DB
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 006975ED
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00697633
                              • GetClientRect.USER32(00000000,?), ref: 0069763F
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00697683
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00697692
                              • GetStockObject.GDI32(00000011), ref: 006976A2
                              • SelectObject.GDI32(00000000,00000000), ref: 006976A6
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 006976B6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006976BF
                              • DeleteDC.GDI32(00000000), ref: 006976C8
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 006976F4
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 0069770B
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00697746
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0069775A
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 0069776B
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0069779B
                              • GetStockObject.GDI32(00000011), ref: 006977A6
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006977B1
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 006977BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: d9d2202784551c2700cf9879784b7dc2b14c7722de05fe44007b40021f69cbbb
                              • Instruction ID: c9a29dde4e20d629e8c93f17b6935313d32397c465764cbe87f317a7e2ef30de
                              • Opcode Fuzzy Hash: d9d2202784551c2700cf9879784b7dc2b14c7722de05fe44007b40021f69cbbb
                              • Instruction Fuzzy Hash: F4A15E71A40615BFEB14DBA4DC4AFAE7BBAEB49715F004118FA15AB2E0D670AD00CF64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0068AD1E
                              • GetDriveTypeW.KERNEL32(?,006AFAC0,?,\\.\,006AF910), ref: 0068ADFB
                              • SetErrorMode.KERNEL32(00000000,006AFAC0,?,\\.\,006AF910), ref: 0068AF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 28e069199b19bd327a497b1ab05e1271caa51e7355ea114bca08df72f6012684
                              • Instruction ID: 4db30f8118a08d0094832abfb2da2c5d59eabc5e11e2e202d721480d656a9c91
                              • Opcode Fuzzy Hash: 28e069199b19bd327a497b1ab05e1271caa51e7355ea114bca08df72f6012684
                              • Instruction Fuzzy Hash: AC51B1B0A44605AF9B50FF90C986CBD73A3EB4C700B25465BED07AB391DA719D02EB53
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: 08b1aa2625d1a6efc55c9e6a6febd50354914c3a6ee504c26edfce7136687495
                              • Instruction ID: a1a99d8907e0e2c795ef42a2b2a0b331e7e6c08474aeb5acbd5337d3d8825167
                              • Opcode Fuzzy Hash: 08b1aa2625d1a6efc55c9e6a6febd50354914c3a6ee504c26edfce7136687495
                              • Instruction Fuzzy Hash: F8812CB16006266ACF25AB60EC43FEF37ABAF05700F044029FD456A295EB71DE45CB59
                              APIs
                              • DestroyWindow.USER32(?,?,?), ref: 00622CA2
                              • DeleteObject.GDI32(00000000), ref: 00622CE8
                              • DeleteObject.GDI32(00000000), ref: 00622CF3
                              • DestroyCursor.USER32(00000000), ref: 00622CFE
                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00622D09
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0065C43B
                              • 6FED0200.COMCTL32(?,000000FF,?), ref: 0065C474
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0065C89D
                                • Part of subcall function 00621B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00622036,?,00000000,?,?,?,?,006216CB,00000000,?), ref: 00621B9A
                              • SendMessageW.USER32(?,00001053), ref: 0065C8DA
                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0065C8F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: DestroyMessageSendWindow$DeleteObject$CursorD0200InvalidateMoveRect
                              • String ID: 0
                              • API String ID: 2824886279-4108050209
                              • Opcode ID: 0af14fe5b89de22c4e220ef6346588f988ba117c69f611f9ebc73b01961d1db4
                              • Instruction ID: fb8bed1d88634db4297004e43f6ab22a95e9bd1314a3a468b9bf00a63cf0fdcf
                              • Opcode Fuzzy Hash: 0af14fe5b89de22c4e220ef6346588f988ba117c69f611f9ebc73b01961d1db4
                              • Instruction Fuzzy Hash: C812AC30604612EFDB60DF24D894BA9BBE2FF49322F544569F885CB262C731E856CF91
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 006A9AD2
                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 006A9B8B
                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 006A9BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: 0
                              • API String ID: 2326795674-4108050209
                              • Opcode ID: ad3c80bef6cd1fc1443d10adb9f2aa286e5ed8d25cf833ead0ab95365cfd1d0f
                              • Instruction ID: 96d2f2fff966246f0c7f69a904baba3af1d35f6a0dff38798cb673e10814b9ac
                              • Opcode Fuzzy Hash: ad3c80bef6cd1fc1443d10adb9f2aa286e5ed8d25cf833ead0ab95365cfd1d0f
                              • Instruction Fuzzy Hash: C602AE30104341AFDB25EF24C849BAABBE6FF86314F24852DF995962A1C735DD44CF62
                              APIs
                              • GetSysColor.USER32(00000012), ref: 006AA903
                              • SetTextColor.GDI32(?,?), ref: 006AA907
                              • GetSysColorBrush.USER32(0000000F), ref: 006AA91D
                              • GetSysColor.USER32(0000000F), ref: 006AA928
                              • CreateSolidBrush.GDI32(?), ref: 006AA92D
                              • GetSysColor.USER32(00000011), ref: 006AA945
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 006AA953
                              • SelectObject.GDI32(?,00000000), ref: 006AA964
                              • SetBkColor.GDI32(?,00000000), ref: 006AA96D
                              • SelectObject.GDI32(?,?), ref: 006AA97A
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 006AA999
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 006AA9B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 006AA9C5
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 006AA9ED
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 006AAA14
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 006AAA32
                              • DrawFocusRect.USER32(?,?), ref: 006AAA3D
                              • GetSysColor.USER32(00000011), ref: 006AAA4B
                              • SetTextColor.GDI32(?,00000000), ref: 006AAA53
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 006AAA67
                              • SelectObject.GDI32(?,006AA5FA), ref: 006AAA7E
                              • DeleteObject.GDI32(?), ref: 006AAA89
                              • SelectObject.GDI32(?,?), ref: 006AAA8F
                              • DeleteObject.GDI32(?), ref: 006AAA94
                              • SetTextColor.GDI32(?,?), ref: 006AAA9A
                              • SetBkColor.GDI32(?,?), ref: 006AAAA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 0907692202046dd1dc28801e1f1a640f5e056b1efda78c74af4184dd3f417108
                              • Instruction ID: 82c39e945a2e36da0e430cd83a483ea1c1611188acd0a36be5fb7a28302ffec8
                              • Opcode Fuzzy Hash: 0907692202046dd1dc28801e1f1a640f5e056b1efda78c74af4184dd3f417108
                              • Instruction Fuzzy Hash: 87513071900208EFDB11AFE4DC48EAEBB7AEF0A320F115265F911AB2A1D771AD40DF51
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 006A8AC1
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A8AD2
                              • CharNextW.USER32(0000014E), ref: 006A8B01
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 006A8B42
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 006A8B58
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A8B69
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 006A8B86
                              • SetWindowTextW.USER32(?,0000014E), ref: 006A8BD8
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 006A8BEE
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 006A8C1F
                              • _memset.LIBCMT ref: 006A8C44
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 006A8C8D
                              • _memset.LIBCMT ref: 006A8CEC
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 006A8D16
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 006A8D6E
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 006A8E1B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 006A8E3D
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006A8E87
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006A8EB4
                              • DrawMenuBar.USER32(?), ref: 006A8EC3
                              • SetWindowTextW.USER32(?,0000014E), ref: 006A8EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: 994c747bac118b3d255b8a78d7c60ea40f27f2e3f7d3db3152144938dad8506c
                              • Instruction ID: 467aed74efcb81603170aa39083589a08d23795f61f3b1a023fc8b08d03a4088
                              • Opcode Fuzzy Hash: 994c747bac118b3d255b8a78d7c60ea40f27f2e3f7d3db3152144938dad8506c
                              • Instruction Fuzzy Hash: 70E16170900219AFDF20AF50CC84EEE7BBAEF06750F14815AFA15AB291DB749D81DF61
                              APIs
                              • GetCursorPos.USER32(?), ref: 006A49CA
                              • GetDesktopWindow.USER32 ref: 006A49DF
                              • GetWindowRect.USER32(00000000), ref: 006A49E6
                              • GetWindowLongW.USER32(?,000000F0), ref: 006A4A48
                              • DestroyWindow.USER32(?), ref: 006A4A74
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006A4A9D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006A4ABB
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006A4AE1
                              • SendMessageW.USER32(?,00000421,?,?), ref: 006A4AF6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006A4B09
                              • IsWindowVisible.USER32(?), ref: 006A4B29
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 006A4B44
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 006A4B58
                              • GetWindowRect.USER32(?,?), ref: 006A4B70
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 006A4B96
                              • GetMonitorInfoW.USER32(00000000,?), ref: 006A4BB0
                              • CopyRect.USER32(?,?), ref: 006A4BC7
                              • SendMessageW.USER32(?,00000412,00000000), ref: 006A4C32
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 615a86b8947bd169e05cbb9585476da8ad9a93e4f1b46e9333fb1388070903cc
                              • Instruction ID: 3e5981633b71534fafc84400f3196eeb5678792d2c89a9280e43ce9aa9886be9
                              • Opcode Fuzzy Hash: 615a86b8947bd169e05cbb9585476da8ad9a93e4f1b46e9333fb1388070903cc
                              • Instruction Fuzzy Hash: 80B17A71604350AFDB44EF64D844B5ABBE6AF86310F00891CF5999B291DBB1EC05CFA6
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006228BC
                              • GetSystemMetrics.USER32(00000007), ref: 006228C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006228EF
                              • GetSystemMetrics.USER32(00000008), ref: 006228F7
                              • GetSystemMetrics.USER32(00000004), ref: 0062291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00622939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00622949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0062297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00622990
                              • GetClientRect.USER32(00000000,000000FF), ref: 006229AE
                              • GetStockObject.GDI32(00000011), ref: 006229CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 006229D5
                                • Part of subcall function 00622344: GetCursorPos.USER32(?), ref: 00622357
                                • Part of subcall function 00622344: ScreenToClient.USER32(006E57B0,?), ref: 00622374
                                • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000001), ref: 00622399
                                • Part of subcall function 00622344: GetAsyncKeyState.USER32(00000002), ref: 006223A7
                              • SetTimer.USER32(00000000,00000000,00000028,00621256), ref: 006229FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 702659e60c6d0e6e1163c9a96cb552a917261430febc9f80b5211f3a1f97bb53
                              • Instruction ID: 590a511960ab54f338e589d5112535577d7c7214f7ae2098cc69c920a5a418cb
                              • Opcode Fuzzy Hash: 702659e60c6d0e6e1163c9a96cb552a917261430febc9f80b5211f3a1f97bb53
                              • Instruction Fuzzy Hash: ECB1AF70A0061AEFDB14DFA8DC95BEE7BB6FB08315F104229FA15A6290DB74E841CF51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcscat$B1560_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 2719676056-1459072770
                              • Opcode ID: c21d3dea26869bcc86206d3b715861764676cd30b83b720719ea74ae0aef8a49
                              • Instruction ID: b942395c2ad7e58e33ca2b7e296a39ad085c2c524f0398975c6e36914ae205ba
                              • Opcode Fuzzy Hash: c21d3dea26869bcc86206d3b715861764676cd30b83b720719ea74ae0aef8a49
                              • Instruction Fuzzy Hash: CB41C871A002127BD750BBB49C47EFF776EDF42710F14015EF905E6282EE34AA1196AA
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 0067A47A
                              • __swprintf.LIBCMT ref: 0067A51B
                              • _wcscmp.LIBCMT ref: 0067A52E
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0067A583
                              • _wcscmp.LIBCMT ref: 0067A5BF
                              • GetClassNameW.USER32(?,?,00000400), ref: 0067A5F6
                              • GetDlgCtrlID.USER32(?), ref: 0067A648
                              • GetWindowRect.USER32(?,?), ref: 0067A67E
                              • GetParent.USER32(?), ref: 0067A69C
                              • ScreenToClient.USER32(00000000), ref: 0067A6A3
                              • GetClassNameW.USER32(?,?,00000100), ref: 0067A71D
                              • _wcscmp.LIBCMT ref: 0067A731
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0067A757
                              • _wcscmp.LIBCMT ref: 0067A76B
                                • Part of subcall function 0064362C: _iswctype.LIBCMT ref: 00643634
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: c829d50d162c5e99689d8cc48f57bee033de0f1cb0242909e3f4a3438401afc3
                              • Instruction ID: 736e51a0c3d46a723319f2688f21a15df9113ceff062f71192e7921f35966dba
                              • Opcode Fuzzy Hash: c829d50d162c5e99689d8cc48f57bee033de0f1cb0242909e3f4a3438401afc3
                              • Instruction Fuzzy Hash: DDA1B135204606AFD718DFA4C884BEEB7EAFF84315F108629F99DC2250DB30E955CB92
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0067AF18
                              • _wcscmp.LIBCMT ref: 0067AF29
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0067AF51
                              • CharUpperBuffW.USER32(?,00000000), ref: 0067AF6E
                              • _wcscmp.LIBCMT ref: 0067AF8C
                              • _wcsstr.LIBCMT ref: 0067AF9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0067AFD5
                              • _wcscmp.LIBCMT ref: 0067AFE5
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0067B00C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0067B055
                              • _wcscmp.LIBCMT ref: 0067B065
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0067B08D
                              • GetWindowRect.USER32(00000004,?), ref: 0067B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: f492b69807b88be62c639e3551987a9bd682f89db052b200741167c2351b5a90
                              • Instruction ID: 587292414dd408f8e6abcb13479b9e83f000fe3276d5c1e29c0000624f851170
                              • Opcode Fuzzy Hash: f492b69807b88be62c639e3551987a9bd682f89db052b200741167c2351b5a90
                              • Instruction Fuzzy Hash: 2E81C1711082059FDB04DF50C885FAA7BEAEF84314F04D56EFD898A291DB34DD49CBA2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 789453d58d50d2a63ba5486fbe089486eb540db246d91314d79f7659beca95c4
                              • Instruction ID: b8eb79911bcb4fc8b30f58fd03983a035db9049cddc0ac396f083d5a3713db03
                              • Opcode Fuzzy Hash: 789453d58d50d2a63ba5486fbe089486eb540db246d91314d79f7659beca95c4
                              • Instruction Fuzzy Hash: 1231C230E4861ABADB51EAA0EE03EEE7767AF10711F64401EF446712D1FF616F048A5B
                              APIs
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00695013
                              • LoadCursorW.USER32(00000000,00007F00), ref: 0069501E
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00695029
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00695034
                              • LoadCursorW.USER32(00000000,00007F01), ref: 0069503F
                              • LoadCursorW.USER32(00000000,00007F81), ref: 0069504A
                              • LoadCursorW.USER32(00000000,00007F88), ref: 00695055
                              • LoadCursorW.USER32(00000000,00007F80), ref: 00695060
                              • LoadCursorW.USER32(00000000,00007F86), ref: 0069506B
                              • LoadCursorW.USER32(00000000,00007F83), ref: 00695076
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00695081
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0069508C
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00695097
                              • LoadCursorW.USER32(00000000,00007F04), ref: 006950A2
                              • LoadCursorW.USER32(00000000,00007F02), ref: 006950AD
                              • LoadCursorW.USER32(00000000,00007F89), ref: 006950B8
                              • GetCursorInfo.USER32(?), ref: 006950C8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Cursor$Load$Info
                              • String ID:
                              • API String ID: 2577412497-0
                              • Opcode ID: 123d73b30e2dfb84740e9ae5d5ecc1682688afc3009f0edd99706921e7ec4b68
                              • Instruction ID: 9e77c4981d1d2e7a8766420fca91069e2585806cd4457d0134129019d9793961
                              • Opcode Fuzzy Hash: 123d73b30e2dfb84740e9ae5d5ecc1682688afc3009f0edd99706921e7ec4b68
                              • Instruction Fuzzy Hash: F93113B1D083196ADF109FB68C899AFBFEDFF04750F50452AE50DE7280DA78A5008FA5
                              APIs
                              • _memset.LIBCMT ref: 006AA259
                              • DestroyWindow.USER32(?,?), ref: 006AA2D3
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 006AA34D
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 006AA36F
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006AA382
                              • DestroyWindow.USER32(00000000), ref: 006AA3A4
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00620000,00000000), ref: 006AA3DB
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006AA3F4
                              • GetDesktopWindow.USER32 ref: 006AA40D
                              • GetWindowRect.USER32(00000000), ref: 006AA414
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 006AA42C
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 006AA444
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: 252e7da23da4eb17efdec5ed45587fdd1d2dd752a3c81323a2aef13c992a41ba
                              • Instruction ID: cbde0a53cb5bad473d8672a7d9e1def299255aca30b6f6cc9c1d90014aad3a6e
                              • Opcode Fuzzy Hash: 252e7da23da4eb17efdec5ed45587fdd1d2dd752a3c81323a2aef13c992a41ba
                              • Instruction Fuzzy Hash: F1716A71140645AFDB21EF68CC49FAA7BE6FB8A304F04451EF9858B2A0D771AD02CF52
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 006A4424
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006A446F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: 0423507548b83d02c4eebc2b9576851b1f8f94a26b2500e20873cffb35725fc4
                              • Instruction ID: ad2b2b4c83dad935e1147d3a21508e080d9aa25108ee7fbece67d86b75ec822f
                              • Opcode Fuzzy Hash: 0423507548b83d02c4eebc2b9576851b1f8f94a26b2500e20873cffb35725fc4
                              • Instruction Fuzzy Hash: 28917C306047119BCB44EF20C851A6EB7E3AF96350F04886DF8965B3A2CB75ED46CF95
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 006AB8B4
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006A91C2), ref: 006AB910
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006AB949
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 006AB98C
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 006AB9C3
                              • FreeLibrary.KERNEL32(?), ref: 006AB9CF
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006AB9DF
                              • DestroyCursor.USER32(?), ref: 006AB9EE
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 006ABA0B
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 006ABA17
                                • Part of subcall function 00642EFD: __wcsicmp_l.LIBCMT ref: 00642F86
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Load$Image$LibraryMessageSend$CursorDestroyExtractFreeIcon__wcsicmp_l
                              • String ID: .dll$.exe$.icl
                              • API String ID: 3907162815-1154884017
                              • Opcode ID: 13f7e06ad66ba0b63e9042d21ad89b06336ed236af735019cc10e7b81e44ac65
                              • Instruction ID: 96d4688c03105df44174f29a27a2118ea263f7b3178f29a615799dfb0c644545
                              • Opcode Fuzzy Hash: 13f7e06ad66ba0b63e9042d21ad89b06336ed236af735019cc10e7b81e44ac65
                              • Instruction Fuzzy Hash: 8761FC71900219BAEB14EF64DC41BFF7BAAEF0A710F10451AF915D62C2DB74AD80DBA0
                              APIs
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • CharLowerBuffW.USER32(?,?), ref: 0068A3CB
                              • GetDriveTypeW.KERNEL32 ref: 0068A418
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A460
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A497
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0068A4C5
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 3200b5a4f9910bdc55083206ef061406769f6ed77955458cb6a810d08c0200df
                              • Instruction ID: ca2e52b2382ea7c0b8f2084b0051ce745cbdf01ae73a012d57599b934b4ccfb0
                              • Opcode Fuzzy Hash: 3200b5a4f9910bdc55083206ef061406769f6ed77955458cb6a810d08c0200df
                              • Instruction Fuzzy Hash: 21518C715047149FC740EF20D891C6AB3E6EF84318F14892EF88A572A1DB31ED0ACF96
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0065E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0067F8DF
                              • LoadStringW.USER32(00000000,?,0065E029,00000001), ref: 0067F8E8
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0065E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0067F90A
                              • LoadStringW.USER32(00000000,?,0065E029,00000001), ref: 0067F90D
                              • __swprintf.LIBCMT ref: 0067F95D
                              • __swprintf.LIBCMT ref: 0067F96E
                              • _wprintf.LIBCMT ref: 0067FA17
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0067FA2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 984253442-2268648507
                              • Opcode ID: 5422e776f427978bb01344422135467e9f563f97e4ff3ed67c7f8c5505ab029f
                              • Instruction ID: 36068979dbe96b69a8e2347436465ad363ccc9faee2a390d9d7a0c344bb3a4cb
                              • Opcode Fuzzy Hash: 5422e776f427978bb01344422135467e9f563f97e4ff3ed67c7f8c5505ab029f
                              • Instruction Fuzzy Hash: 7F416F7290062DAACF54FFE0ED86DEEB77AAF14300F100469B50976192EA316F49CF65
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,006A9207,?,?), ref: 006ABA56
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,006A9207,?,?,00000000,?), ref: 006ABA6D
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,006A9207,?,?,00000000,?), ref: 006ABA78
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,006A9207,?,?,00000000,?), ref: 006ABA85
                              • GlobalLock.KERNEL32(00000000), ref: 006ABA8E
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,006A9207,?,?,00000000,?), ref: 006ABA9D
                              • GlobalUnlock.KERNEL32(00000000), ref: 006ABAA6
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,006A9207,?,?,00000000,?), ref: 006ABAAD
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 006ABABE
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,006B2CAC,?), ref: 006ABAD7
                              • GlobalFree.KERNEL32(00000000), ref: 006ABAE7
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 006ABB0B
                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 006ABB36
                              • DeleteObject.GDI32(00000000), ref: 006ABB5E
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 006ABB74
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3840717409-0
                              • Opcode ID: cd32321ce98bf225478041ab512c730687367a370a5969aabee280a20d61b4bc
                              • Instruction ID: 6c24c911cd725fad8fc8634f755f3adef72146649ca5edef759830f61f5ecf23
                              • Opcode Fuzzy Hash: cd32321ce98bf225478041ab512c730687367a370a5969aabee280a20d61b4bc
                              • Instruction Fuzzy Hash: 44412B75600204EFDB11AFA5DC48EAA7BBAFF8A711F105068F905D7261D730AE41CF61
                              APIs
                                • Part of subcall function 00640957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00626B0C,?,00008000), ref: 00640973
                                • Part of subcall function 00624750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00624743,?,?,006237AE,?), ref: 00624770
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00626BAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00626CFA
                                • Part of subcall function 0062586D: _wcscpy.LIBCMT ref: 006258A5
                                • Part of subcall function 0064363D: _iswctype.LIBCMT ref: 00643645
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$/vb$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-3773326070
                              • Opcode ID: 13338f3a5eecaf17cfa01596d81b0d00c4d883825231b1a28c4f7f1abe9574a4
                              • Instruction ID: c7e37350dcd77ad0c2b054e7fc50afe3f9b34362e046f0390d219547f019c2e0
                              • Opcode Fuzzy Hash: 13338f3a5eecaf17cfa01596d81b0d00c4d883825231b1a28c4f7f1abe9574a4
                              • Instruction Fuzzy Hash: 2402BD305087519FCB64EF20D8819AFBBE6AF99314F10481DF88A972A1DB31DA49CF56
                              APIs
                              • __wsplitpath.LIBCMT ref: 0068DA10
                              • _wcscat.LIBCMT ref: 0068DA28
                              • _wcscat.LIBCMT ref: 0068DA3A
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0068DA4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0068DA63
                              • GetFileAttributesW.KERNEL32(?), ref: 0068DA7B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0068DA95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0068DAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: 48091559385ec63d39db6eb1b6ed10b98011b736902c81e95d3bdcbe25158373
                              • Instruction ID: dcd698efd014e09f63c77ca62c99a2f6fd678bd5bbae366254323a86c08e0516
                              • Opcode Fuzzy Hash: 48091559385ec63d39db6eb1b6ed10b98011b736902c81e95d3bdcbe25158373
                              • Instruction Fuzzy Hash: A68182715043419FCB64FF64C844AAAB7EABF89310F184A2EF889D7391E630DD45CB62
                              APIs
                              • GetDC.USER32(00000000), ref: 0069738F
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0069739B
                              • CreateCompatibleDC.GDI32(?), ref: 006973A7
                              • SelectObject.GDI32(00000000,?), ref: 006973B4
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00697408
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00697444
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00697468
                              • SelectObject.GDI32(00000006,?), ref: 00697470
                              • DeleteObject.GDI32(?), ref: 00697479
                              • DeleteDC.GDI32(00000006), ref: 00697480
                              • ReleaseDC.USER32(00000000,?), ref: 0069748B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: a0b564acceb00519262471efdda06f258a10ac935ba378d5d96b3ca7cb7c3675
                              • Instruction ID: c7de040d1af855c3ede17a797a1fc1f40ba8ee7a9d3d9f34175309c2b6e5dbd3
                              • Opcode Fuzzy Hash: a0b564acceb00519262471efdda06f258a10ac935ba378d5d96b3ca7cb7c3675
                              • Instruction Fuzzy Hash: 0A514875904209EFCB14DFA8CC84EAEBBBAEF49710F14842EF99997211C731A9418B50
                              APIs
                              • _memset.LIBCMT ref: 00682D50
                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00682DDD
                              • GetMenuItemCount.USER32(006E5890), ref: 00682E66
                              • DeleteMenu.USER32(006E5890,00000005,00000000,000000F5,?,?), ref: 00682EF6
                              • DeleteMenu.USER32(006E5890,00000004,00000000), ref: 00682EFE
                              • DeleteMenu.USER32(006E5890,00000006,00000000), ref: 00682F06
                              • DeleteMenu.USER32(006E5890,00000003,00000000), ref: 00682F0E
                              • GetMenuItemCount.USER32(006E5890), ref: 00682F16
                              • SetMenuItemInfoW.USER32(006E5890,00000004,00000000,00000030), ref: 00682F4C
                              • GetCursorPos.USER32(?), ref: 00682F56
                              • SetForegroundWindow.USER32(00000000), ref: 00682F5F
                              • TrackPopupMenuEx.USER32(006E5890,00000000,?,00000000,00000000,00000000), ref: 00682F72
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00682F7E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 3993528054-0
                              • Opcode ID: aa15c8293cf5bbfe8ec8c8eda86f1ee6ec7eeb7619048c2c37da970e277652cf
                              • Instruction ID: 150ae6225c746aaf34ca88c60dfb7983d6d18c7ea5e77f9b47f32b163036dcda
                              • Opcode Fuzzy Hash: aa15c8293cf5bbfe8ec8c8eda86f1ee6ec7eeb7619048c2c37da970e277652cf
                              • Instruction Fuzzy Hash: A571D470640207BAEB21AF54DCA9FEABF66FF05314F100316F615AA2E1C7B16C50DB99
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0069FDAD,?,?), ref: 006A0E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 0e2340c2ebee8c10c9fcad06ca1103eebbe82f6dc83c36adc8c752f677d329ac
                              • Instruction ID: 3cfa66d699c26fef9c5b231e9d6e7de37830377c6977015877a15b404c22a6e1
                              • Opcode Fuzzy Hash: 0e2340c2ebee8c10c9fcad06ca1103eebbe82f6dc83c36adc8c752f677d329ac
                              • Instruction Fuzzy Hash: EE415B3154025A8FEF60EF10E865AEE37A6BF12344F144469FC552B392DB30AD5ACFA0
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0065E2A0,00000010,?,Bad directive syntax error,006AF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0067F7C2
                              • LoadStringW.USER32(00000000,?,0065E2A0,00000010), ref: 0067F7C9
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • _wprintf.LIBCMT ref: 0067F7FC
                              • __swprintf.LIBCMT ref: 0067F81E
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0067F88D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 1506413516-4153970271
                              • Opcode ID: 08430187ad4d65840d4eb4d92cd6f166c2f36cc5f32a1ec0422565e1824671eb
                              • Instruction ID: c5f5eb9d02cd97bca2fc74e0b833cfcb1e3b1ef787bab9532909492c4392353f
                              • Opcode Fuzzy Hash: 08430187ad4d65840d4eb4d92cd6f166c2f36cc5f32a1ec0422565e1824671eb
                              • Instruction Fuzzy Hash: 7921713294022EEFCF51EF90DC4AEEE773ABF14300F04486AF515661A2DA71A618DF55
                              APIs
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                                • Part of subcall function 00627924: _memmove.LIBCMT ref: 006279AD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00685330
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00685346
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00685357
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00685369
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0068537A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: 404a6488579a8929136cd54039671b25aaa301b1ba969e27a237f2f59cd431c6
                              • Instruction ID: 9972bb2c13aae457afd13074b868a088861d100792c6111bd96dcb509b9a66a7
                              • Opcode Fuzzy Hash: 404a6488579a8929136cd54039671b25aaa301b1ba969e27a237f2f59cd431c6
                              • Instruction Fuzzy Hash: 8911B230E506697ED760BB71DC4ADFF7B7EEB92B40F00042AB402A31D1EEA05D45CAA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 8aeee9c457643a7a2191714c6bab42010db1bb3a0493b4a7d297a7c94a42b4f4
                              • Instruction ID: 5ad640c265b9f1f02a3ed46c13a25cdc1ef3e0abc52d3620817330a629ce9725
                              • Opcode Fuzzy Hash: 8aeee9c457643a7a2191714c6bab42010db1bb3a0493b4a7d297a7c94a42b4f4
                              • Instruction Fuzzy Hash: 011127319041156FDB60BB709C4AEDA7BBEEF02711F0002BAF44592191EF75DD818B65
                              APIs
                              • timeGetTime.WINMM ref: 00684F7A
                                • Part of subcall function 0064049F: timeGetTime.WINMM(?,7707B400,00630E7B), ref: 006404A3
                              • Sleep.KERNEL32(0000000A), ref: 00684FA6
                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00684FCA
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00684FEC
                              • SetActiveWindow.USER32 ref: 0068500B
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00685019
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00685038
                              • Sleep.KERNEL32(000000FA), ref: 00685043
                              • IsWindow.USER32 ref: 0068504F
                              • EndDialog.USER32(00000000), ref: 00685060
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: 720e610d5b6849ee562a6b425b3ec1afa4e3845336fdc4144ba23195327e4ef3
                              • Instruction ID: 7e945b1b4e869473023c755d8bcbee4af2f45cffe6fcde85ad967e2fc1bf6aca
                              • Opcode Fuzzy Hash: 720e610d5b6849ee562a6b425b3ec1afa4e3845336fdc4144ba23195327e4ef3
                              • Instruction Fuzzy Hash: BD21A170600B45AFE7107FA0ECC8A363BABEB56785F043128F203862B1DB719D448B72
                              APIs
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • CoInitialize.OLE32(00000000), ref: 0068D5EA
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0068D67D
                              • SHGetDesktopFolder.SHELL32(?), ref: 0068D691
                              • CoCreateInstance.COMBASE(006B2D7C,00000000,00000001,006D8C1C,?), ref: 0068D6DD
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0068D74C
                              • CoTaskMemFree.COMBASE(?), ref: 0068D7A4
                              • _memset.LIBCMT ref: 0068D7E1
                              • SHBrowseForFolderW.SHELL32(?), ref: 0068D81D
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0068D840
                              • CoTaskMemFree.COMBASE(00000000), ref: 0068D847
                              • CoTaskMemFree.COMBASE(00000000), ref: 0068D87E
                              • CoUninitialize.COMBASE ref: 0068D880
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: 89354ad71734d4f9d4a5d5ba6abd3ccc9b75a6be40f554eb26ab3f520582710b
                              • Instruction ID: b273a5723015ef181279785f5a25d7156c3d44903568cb13b33055d1c82ec9c0
                              • Opcode Fuzzy Hash: 89354ad71734d4f9d4a5d5ba6abd3ccc9b75a6be40f554eb26ab3f520582710b
                              • Instruction Fuzzy Hash: B4B1EA75A00119AFDB44EFA4C884DAEBBBAEF49304F148569F909DB261DB30ED41CF64
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 0067C283
                              • GetWindowRect.USER32(00000000,?), ref: 0067C295
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0067C2F3
                              • GetDlgItem.USER32(?,00000002), ref: 0067C2FE
                              • GetWindowRect.USER32(00000000,?), ref: 0067C310
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0067C364
                              • GetDlgItem.USER32(?,000003E9), ref: 0067C372
                              • GetWindowRect.USER32(00000000,?), ref: 0067C383
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0067C3C6
                              • GetDlgItem.USER32(?,000003EA), ref: 0067C3D4
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0067C3F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0067C3FE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 327f7aed521c79fa04d3ee8c8460044237c6ef537b2122fe9d81a409252e6934
                              • Instruction ID: cd36b4940e1b8b84924e22b55f9020370e0be730167491cf798929c4012e1b40
                              • Opcode Fuzzy Hash: 327f7aed521c79fa04d3ee8c8460044237c6ef537b2122fe9d81a409252e6934
                              • Instruction Fuzzy Hash: DA515371B00205AFDB18DFA9DD89AAEBBB6EB88310F14912DF519D7290D770AD008B50
                              APIs
                                • Part of subcall function 006225DB: GetWindowLongW.USER32(?,000000EB), ref: 006225EC
                              • GetSysColor.USER32(0000000F), ref: 006221D3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: ceab3ac49bb85bc2fef76228d4e27bbe1fa717d92442b9d36c6cf5a02c4782e0
                              • Instruction ID: d35278b640ae4bfc5cdc6c136c73bae9bbfd5e43311411e407253da7bc022b89
                              • Opcode Fuzzy Hash: ceab3ac49bb85bc2fef76228d4e27bbe1fa717d92442b9d36c6cf5a02c4782e0
                              • Instruction Fuzzy Hash: B141D330001951EADB215F68EC98BF93B67EB06321F185365FD619A2E1C7328D42DF22
                              APIs
                              • CharLowerBuffW.USER32(?,?,006AF910), ref: 0068A90B
                              • GetDriveTypeW.KERNEL32(00000061,006D89A0,00000061), ref: 0068A9D5
                              • _wcscpy.LIBCMT ref: 0068A9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: aec259042491dbb3fe544774c8e276a180535567f17680ce86134158e5b310a7
                              • Instruction ID: 82ffaa612b5bd6365bb139e6b5c3f5ac19c8239976f43b993c43b3d932adb8f0
                              • Opcode Fuzzy Hash: aec259042491dbb3fe544774c8e276a180535567f17680ce86134158e5b310a7
                              • Instruction Fuzzy Hash: F751CD315183109FD744EF54D892AAFB7A7EF84300F044A2EF99A572A2DB319D09CB93
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: 05079829bb9b71e5ac1a11686b3c4d97164f78ef7d96f9d1f04c6177eb02a129
                              • Instruction ID: ec2d3ee8d9e9db08f0595ac22ce3074371f79180252978312f6b2f92011602f8
                              • Opcode Fuzzy Hash: 05079829bb9b71e5ac1a11686b3c4d97164f78ef7d96f9d1f04c6177eb02a129
                              • Instruction Fuzzy Hash: 4441C571910616AFEB24DF34D842EB673EBEF45300F24486EE949D7391EA359946CF20
                              APIs
                              Strings
                              • failed to get memory, xrefs: 00636326
                              • internal error: opcode not recognized, xrefs: 0063631B
                              • ERCP, xrefs: 006361B3
                              • argument is not a compiled regular expression, xrefs: 00670D87
                              • 3cc, xrefs: 006362AF
                              • internal error: missing capturing bracket, xrefs: 00670D7F
                              • argument not compiled in 16 bit mode, xrefs: 00670D77
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: 3cc$ERCP$argument is not a compiled regular expression$argument not compiled in 16 bit mode$failed to get memory$internal error: missing capturing bracket$internal error: opcode not recognized
                              • API String ID: 2532777613-1936413669
                              • Opcode ID: 40a103be3ed751635c26c15f3828014f46d541d223a576534822d13b7ba8ca76
                              • Instruction ID: a74c725209ed03ad5e1eab7930c08fbdfabb8c9c69343932bd3cb2379e752b4d
                              • Opcode Fuzzy Hash: 40a103be3ed751635c26c15f3828014f46d541d223a576534822d13b7ba8ca76
                              • Instruction Fuzzy Hash: 33518071900705EBEB24CF65C941BEBBBF6EF44314F20856EE54ACB291E770AA45CB90
                              APIs
                              • _memset.LIBCMT ref: 006A716A
                              • CreateMenu.USER32 ref: 006A7185
                              • SetMenu.USER32(?,00000000), ref: 006A7194
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006A7221
                              • IsMenu.USER32(?), ref: 006A7237
                              • CreatePopupMenu.USER32 ref: 006A7241
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006A726E
                              • DrawMenuBar.USER32 ref: 006A7276
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: 91771cd0c8c5a7ce24cfcd719832591fee47092c57ba941ed2fe500b231dab8b
                              • Instruction ID: 4b5131fb6c5546fe0de241194f281812ff23c07c613db0ce5918dbcb5b12aac7
                              • Opcode Fuzzy Hash: 91771cd0c8c5a7ce24cfcd719832591fee47092c57ba941ed2fe500b231dab8b
                              • Instruction Fuzzy Hash: 21411575A01205EFDB20EFA4D994B9ABBB6FF4A310F144429F945A7361D731AE10CF90
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 006A755E
                              • CreateCompatibleDC.GDI32(00000000), ref: 006A7565
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 006A7578
                              • SelectObject.GDI32(00000000,00000000), ref: 006A7580
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 006A758B
                              • DeleteDC.GDI32(00000000), ref: 006A7594
                              • GetWindowLongW.USER32(?,000000EC), ref: 006A759E
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006A75B2
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006A75BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: 175d9fa82c6edb8d88bf5b5833b21516defacf5447159e13a74ed0d9080bcc84
                              • Instruction ID: ce87678a555655f07cde1d411f97b7811d2062bfc4739c756d7e2e14109761fc
                              • Opcode Fuzzy Hash: 175d9fa82c6edb8d88bf5b5833b21516defacf5447159e13a74ed0d9080bcc84
                              • Instruction Fuzzy Hash: 47316C32504214ABDF11AFA4DC08FDB3B6AFF0A321F111224FA55961A1CB71EC21DFA5
                              APIs
                              • _memset.LIBCMT ref: 00646E3E
                                • Part of subcall function 00648B28: __getptd_noexit.LIBCMT ref: 00648B28
                              • __gmtime64_s.LIBCMT ref: 00646ED7
                              • __gmtime64_s.LIBCMT ref: 00646F0D
                              • __gmtime64_s.LIBCMT ref: 00646F2A
                              • __allrem.LIBCMT ref: 00646F80
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00646F9C
                              • __allrem.LIBCMT ref: 00646FB3
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00646FD1
                              • __allrem.LIBCMT ref: 00646FE8
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00647006
                              • __invoke_watson.LIBCMT ref: 00647077
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction ID: bfa711a2150de4091795e1908dea4f9a69ff641278542b61e014016f9af2f8b0
                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction Fuzzy Hash: 337126B2A00717ABD714AE68CC41BEAB3FAAF01764F10422DF814D7381EB70DD448795
                              APIs
                              • _memset.LIBCMT ref: 00682542
                              • GetMenuItemInfoW.USER32(006E5890,000000FF,00000000,00000030), ref: 006825A3
                              • SetMenuItemInfoW.USER32(006E5890,00000004,00000000,00000030), ref: 006825D9
                              • Sleep.KERNEL32(000001F4), ref: 006825EB
                              • GetMenuItemCount.USER32(?), ref: 0068262F
                              • GetMenuItemID.USER32(?,00000000), ref: 0068264B
                              • GetMenuItemID.USER32(?,-00000001), ref: 00682675
                              • GetMenuItemID.USER32(?,?), ref: 006826BA
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00682700
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00682714
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00682735
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: 773e31ac7f78f0718ba2ca02aa6ea1390ff91b9cba661fa507833f0f063935c9
                              • Instruction ID: af6228cfa680c0e52f1803589714a1592c5caed2658c0d80391e660a8214fa88
                              • Opcode Fuzzy Hash: 773e31ac7f78f0718ba2ca02aa6ea1390ff91b9cba661fa507833f0f063935c9
                              • Instruction Fuzzy Hash: 5D61A47090024AAFDF21EFA4DCA8DFE7BBAFB05304F140259E942A7251D731AD45DB21
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006A6FA5
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006A6FA8
                              • GetWindowLongW.USER32(?,000000F0), ref: 006A6FCC
                              • _memset.LIBCMT ref: 006A6FDD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006A6FEF
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006A7067
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: 676b2b933e2a256fcb397dfc9315924badc36763ef38f57475199aabea6365cb
                              • Instruction ID: 3e7405195817a9da0c1c3dd70b899fcb8aedf7d29877f868785f5b2154b1ea26
                              • Opcode Fuzzy Hash: 676b2b933e2a256fcb397dfc9315924badc36763ef38f57475199aabea6365cb
                              • Instruction Fuzzy Hash: 55617B75900248AFDB10EFA4CC81EEE77FAAB0A714F144159FA15AB3A1C771AD41DF90
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00676BBF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 00676C18
                              • VariantInit.OLEAUT32(?), ref: 00676C2A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00676C4A
                              • VariantCopy.OLEAUT32(?,?), ref: 00676C9D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00676CB1
                              • VariantClear.OLEAUT32(?), ref: 00676CC6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00676CD3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00676CDC
                              • VariantClear.OLEAUT32(?), ref: 00676CEE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00676CF9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: bd7f75f515ea74c8c10b9c6dd0b1014358d2e89d738162be5b66fab0533a5a96
                              • Instruction ID: 2eadf5aaa533cd9589a98d5a12133cc9df570e7d0842fc0feca28d076d75c4ea
                              • Opcode Fuzzy Hash: bd7f75f515ea74c8c10b9c6dd0b1014358d2e89d738162be5b66fab0533a5a96
                              • Instruction Fuzzy Hash: 59417F31A006199FCF00EFA8D8449EEBBBAEF48350F00C069F955E7261DB31A945CFA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                              • API String ID: 2862541840-1765764032
                              • Opcode ID: 07616fed6d1585f2be7395def03bbd7d675bcc2c4166c45a622a59dfba787c9d
                              • Instruction ID: c3e3d00d15a8aa567c068cc263cbca8397fabbeaa0981c6446f3f887d7966d35
                              • Opcode Fuzzy Hash: 07616fed6d1585f2be7395def03bbd7d675bcc2c4166c45a622a59dfba787c9d
                              • Instruction Fuzzy Hash: 4F91AE71A00219ABDF24DFA9C848FEEBBBAEF45710F10811DF505AB280D7709941CFA0
                              APIs
                              • WSAStartup.WS2_32(00000101,?), ref: 00695793
                              • inet_addr.WS2_32(?), ref: 006957D8
                              • gethostbyname.WS2_32(?), ref: 006957E4
                              • IcmpCreateFile.IPHLPAPI ref: 006957F2
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00695862
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00695878
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006958ED
                              • WSACleanup.WS2_32 ref: 006958F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: 2a72fc8b25ee198c43adeb348746a85521580d10e9da0ea8e590a3372d83d960
                              • Instruction ID: 02634bed6591eac2f52174f2f19f362eab242e0e94a9586ccb917a9253f3b214
                              • Opcode Fuzzy Hash: 2a72fc8b25ee198c43adeb348746a85521580d10e9da0ea8e590a3372d83d960
                              • Instruction Fuzzy Hash: 3951BE31600A109FDB21EF64DD45B6AB7EAEF49320F048929F956DB2A1DB30EC00CF46
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0068B4D0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0068B546
                              • GetLastError.KERNEL32 ref: 0068B550
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 0068B5BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 0a1dd6ebd71aa887d703f1966acc5172980834840d7f49405df56deea1f9b666
                              • Instruction ID: 93466a28d2d7bccba3079869e5dc8e652b1415a55e34af1fe26052738de29ebb
                              • Opcode Fuzzy Hash: 0a1dd6ebd71aa887d703f1966acc5172980834840d7f49405df56deea1f9b666
                              • Instruction Fuzzy Hash: BB31A135A002059FCB10FFA8D885EEE77B6FF49300F10422AF50597391DB71AA42CB92
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00679014
                              • GetDlgCtrlID.USER32 ref: 0067901F
                              • GetParent.USER32 ref: 0067903B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0067903E
                              • GetDlgCtrlID.USER32(?), ref: 00679047
                              • GetParent.USER32(?), ref: 00679063
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00679066
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 386a31848cc7986812fdbbc23417d2c202a684fb2d4f4185001cb6fb31973540
                              • Instruction ID: 26d00c56b2cc711196a06a87e53bc2573b6079c269ce68be6dea1dde81378c22
                              • Opcode Fuzzy Hash: 386a31848cc7986812fdbbc23417d2c202a684fb2d4f4185001cb6fb31973540
                              • Instruction Fuzzy Hash: D821D370A00108BBDF14ABA0CC85EFEBBBAEF4A310F10412AF925972A1DB755815DF21
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006790FD
                              • GetDlgCtrlID.USER32 ref: 00679108
                              • GetParent.USER32 ref: 00679124
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00679127
                              • GetDlgCtrlID.USER32(?), ref: 00679130
                              • GetParent.USER32(?), ref: 0067914C
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0067914F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 2167df0c8e2ca39410bf86188153d561e47e9729739e5b45a5259b0bfc41b08e
                              • Instruction ID: ca6b9d09216071b813592eb0b3464016b7e546780f75bf2eea5758720eff0158
                              • Opcode Fuzzy Hash: 2167df0c8e2ca39410bf86188153d561e47e9729739e5b45a5259b0bfc41b08e
                              • Instruction Fuzzy Hash: C521F574E00108BBDF10ABA0CC85EFEBBBAEF46300F00401AB915972A1DB755855DF21
                              APIs
                              • GetParent.USER32 ref: 0067916F
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00679184
                              • _wcscmp.LIBCMT ref: 00679196
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00679211
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: 2bc031f2cd2db317da17d4fd3c75e988e8b0b9326a192087b0e6bae644179b06
                              • Instruction ID: b41050292504c4650d9c79f6a49ef2caa2286e5997c77b491ea10d39f40fa6be
                              • Opcode Fuzzy Hash: 2bc031f2cd2db317da17d4fd3c75e988e8b0b9326a192087b0e6bae644179b06
                              • Instruction Fuzzy Hash: 7A115C37698307BAFB103624EC27DE737DF9B16320B304027F914E42D2FE62A92159A5
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 006988D7
                              • CoInitialize.OLE32(00000000), ref: 00698904
                              • CoUninitialize.COMBASE ref: 0069890E
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00698A0E
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00698B3B
                              • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002,?,00000001,006B2C0C), ref: 00698B6F
                              • CoGetObject.OLE32(?,00000000,006B2C0C,?), ref: 00698B92
                              • SetErrorMode.KERNEL32(00000000), ref: 00698BA5
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00698C25
                              • VariantClear.OLEAUT32(?), ref: 00698C35
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 807be859679c2da8ce4786eba60efa7dc777ce5f9c74b391c2710383846edaf4
                              • Instruction ID: 473a515a705aca1102ef690c155d33b0ed20ea45e44c115751c9e745249268e0
                              • Opcode Fuzzy Hash: 807be859679c2da8ce4786eba60efa7dc777ce5f9c74b391c2710383846edaf4
                              • Instruction Fuzzy Hash: FCC139B12043059FDB40EF64C88496BB7EAFF8A348F04491DF58A9B251DB71ED06CB52
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00687A6C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ArraySafeVartype
                              • String ID:
                              • API String ID: 1725837607-0
                              • Opcode ID: 56babfdee1d465397a8adf3ae9eeae9a2ca351d0fca4745ca2a456d2c863c86d
                              • Instruction ID: f612d4c9f2baa06bd3ba8fe0f8c7dfa19ffd47aa79319e0da94e817cf6d011cd
                              • Opcode Fuzzy Hash: 56babfdee1d465397a8adf3ae9eeae9a2ca351d0fca4745ca2a456d2c863c86d
                              • Instruction Fuzzy Hash: 2CB1BD7190421A9FDB00EFA4C885BBEBBF6FF49321F244169EA01E7241D734E941CBA5
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 006811F0
                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00680268,?,00000001), ref: 00681204
                              • GetWindowThreadProcessId.USER32(00000000), ref: 0068120B
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680268,?,00000001), ref: 0068121A
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0068122C
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680268,?,00000001), ref: 00681245
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00680268,?,00000001), ref: 00681257
                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00680268,?,00000001), ref: 0068129C
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00680268,?,00000001), ref: 006812B1
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00680268,?,00000001), ref: 006812BC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: 8f22aeb2d75270cabb6768b2dc3dd3bb082e7b0477c458e2ee5b8a55078b0ebf
                              • Instruction ID: 7ca1d9bbf2bfb55a74aec640b8aef9240dc7115be4f71741d80460b1299135a6
                              • Opcode Fuzzy Hash: 8f22aeb2d75270cabb6768b2dc3dd3bb082e7b0477c458e2ee5b8a55078b0ebf
                              • Instruction Fuzzy Hash: 58319175600304FBDB60AF94EC98FA977AFEB66351F105215F904CE2A0E7B4AE818F51
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0062FAA6
                              • OleUninitialize.OLE32(?,00000000), ref: 0062FB45
                              • UnregisterHotKey.USER32(?), ref: 0062FC9C
                              • DestroyWindow.USER32(?), ref: 006645D6
                              • FreeLibrary.KERNEL32(?), ref: 0066463B
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00664668
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 4440decce031fed3c8528af2789cfb022fba2f52166273137bda07bbe2086584
                              • Instruction ID: 8495651a29e04c506cb1d836880bd7362c8393ff07d3f73e0a17f750b0c73577
                              • Opcode Fuzzy Hash: 4440decce031fed3c8528af2789cfb022fba2f52166273137bda07bbe2086584
                              • Instruction Fuzzy Hash: AFA16D30701622CFDB69EF14D995AA9F766AF05700F5442BDE80AAB261CF30AD16CF94
                              APIs
                              • EnumChildWindows.USER32(?,0067A439), ref: 0067A377
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 19c522ee39f65ba5104b55dfe69e81ba834a5c6f5557191556609c132e13430d
                              • Instruction ID: c7fc1a343e85d65dedc67d6e329588802d033904036ec7956b12c5702195818d
                              • Opcode Fuzzy Hash: 19c522ee39f65ba5104b55dfe69e81ba834a5c6f5557191556609c132e13430d
                              • Instruction Fuzzy Hash: D0910231A00616AADB48DFE0C441BEDFBB7BF44310F54C11DE85EA7252DB306A99CB95
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00622EAE
                                • Part of subcall function 00621DB3: GetClientRect.USER32(?,?), ref: 00621DDC
                                • Part of subcall function 00621DB3: GetWindowRect.USER32(?,?), ref: 00621E1D
                                • Part of subcall function 00621DB3: ScreenToClient.USER32(?,?), ref: 00621E45
                              • GetDC.USER32 ref: 0065CD32
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0065CD45
                              • SelectObject.GDI32(00000000,00000000), ref: 0065CD53
                              • SelectObject.GDI32(00000000,00000000), ref: 0065CD68
                              • ReleaseDC.USER32(?,00000000), ref: 0065CD70
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0065CDFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 4b4dd73ecf39930a519d32860d30aca72ce7d40189712024fbfa15b7d25dff2a
                              • Instruction ID: a93f4bc99ea33218d924d8bfe53a1fa4929832c23f5dec1c5268534604dabc34
                              • Opcode Fuzzy Hash: 4b4dd73ecf39930a519d32860d30aca72ce7d40189712024fbfa15b7d25dff2a
                              • Instruction Fuzzy Hash: 6571CF31400306EFCF219F64C890AEA7BB7FF49325F14426AED969A2A6C7319C45DF60
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 006A6E24
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 006A6E38
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006A6E52
                              • _wcscat.LIBCMT ref: 006A6EAD
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 006A6EC4
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 006A6EF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: -----$SysListView32
                              • API String ID: 307300125-3975388722
                              • Opcode ID: d81740ab616d07bd99efcb187bbb3e9ab3e19fe1eaaffbf54fd2e608cfd6eaee
                              • Instruction ID: 65a78faf496ae13392382e2eef105475052beb1dcc2c056c8827287849cabe7f
                              • Opcode Fuzzy Hash: d81740ab616d07bd99efcb187bbb3e9ab3e19fe1eaaffbf54fd2e608cfd6eaee
                              • Instruction Fuzzy Hash: 7D419070A00349AFEF21AFA4CC85BEA77EAEF09350F14042AF585E7291D6719D848F64
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00691A50
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00691A7C
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00691ABE
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00691AD3
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00691AE0
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00691B10
                              • InternetCloseHandle.WININET(00000000), ref: 00691B57
                                • Part of subcall function 00692483: GetLastError.KERNEL32(?,?,00691817,00000000,00000000,00000001), ref: 00692498
                                • Part of subcall function 00692483: SetEvent.KERNEL32(?,?,00691817,00000000,00000000,00000001), ref: 006924AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                              • String ID:
                              • API String ID: 2603140658-3916222277
                              • Opcode ID: 4de799f51bcc016311ab42c433a489ebc9b11bb697f2c3b59e7a788cee283d01
                              • Instruction ID: 4ea57015fbf4c4421d65550b5756560164c041dcb99d8b6c0d2f4eb5e113bc7d
                              • Opcode Fuzzy Hash: 4de799f51bcc016311ab42c433a489ebc9b11bb697f2c3b59e7a788cee283d01
                              • Instruction Fuzzy Hash: 1A4191B150121ABFEF119F50CC85FFA77AEEF0A350F10412AF9059A241E770DE418BA5
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,006AF910), ref: 00698D28
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,006AF910), ref: 00698D5C
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00698ED6
                              • SysFreeString.OLEAUT32(?), ref: 00698F00
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: e0988cacfd54e86b6efba6de4c7038d2c177d6bf1a29a59d720c7d8f6cdaea72
                              • Instruction ID: af00e96fd8ddc1ee8e36e0f69ab7fd50894942f35594bfcf00f425611ff07a80
                              • Opcode Fuzzy Hash: e0988cacfd54e86b6efba6de4c7038d2c177d6bf1a29a59d720c7d8f6cdaea72
                              • Instruction Fuzzy Hash: 5EF1F871A00219AFDF14DF94C884EEEB7BAFF49314F108498F915AB251DB31AE46CB61
                              APIs
                              • _memset.LIBCMT ref: 0069F6B5
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0069F848
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0069F86C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0069F8AC
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0069F8CE
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0069FA4A
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0069FA7C
                              • CloseHandle.KERNEL32(?), ref: 0069FAAB
                              • CloseHandle.KERNEL32(?), ref: 0069FB22
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 72d76724ed06fd87adbd7da691a06df4e0562bbaa4899675e035bd0f8f9fb488
                              • Instruction ID: 1eac02ea195460dbf10ae0444e805345b16b20f1d388b002b4c8c3e465ae89fd
                              • Opcode Fuzzy Hash: 72d76724ed06fd87adbd7da691a06df4e0562bbaa4899675e035bd0f8f9fb488
                              • Instruction Fuzzy Hash: 15E1B0316043019FCB54EF24D891BAABBE6AF85314F19896DF8998B3A1CB31DC41CF56
                              APIs
                                • Part of subcall function 00621B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00622036,?,00000000,?,?,?,?,006216CB,00000000,?), ref: 00621B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006220D3
                              • KillTimer.USER32(-00000001,?,?,?,?,006216CB,00000000,?,?,00621AE2,?,?), ref: 0062216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 0065BCA6
                              • DeleteObject.GDI32(00000000), ref: 0065BD1C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 2402799130-0
                              • Opcode ID: c249716bb2c4f96eeb7781608fe31ffa5bdd2b76f1c5abb3429ea64cdfe6dba9
                              • Instruction ID: 40e0a9c1373689fc4da8f0d9b98314e0e713aa84ef52cdb4d222f7c5847fe77f
                              • Opcode Fuzzy Hash: c249716bb2c4f96eeb7781608fe31ffa5bdd2b76f1c5abb3429ea64cdfe6dba9
                              • Instruction Fuzzy Hash: 5C618D31100B61EFCB25AF14E9A8B66B7F3FF41316F106528E9824A670C771A895DF91
                              APIs
                                • Part of subcall function 0068466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00683697,?), ref: 0068468B
                                • Part of subcall function 0068466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00683697,?), ref: 006846A4
                                • Part of subcall function 00684A31: GetFileAttributesW.KERNEL32(?,0068370B), ref: 00684A32
                              • lstrcmpiW.KERNEL32(?,?), ref: 00684D40
                              • _wcscmp.LIBCMT ref: 00684D5A
                              • MoveFileW.KERNEL32(?,?), ref: 00684D75
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: 901b03b0014760651327339da643b404e61c38d3a9c808b8f7bd09c5560d01ca
                              • Instruction ID: f6e2b6874fb23bde898edc479da29f06f4bcbb81088daf9945489319ebe0e7b3
                              • Opcode Fuzzy Hash: 901b03b0014760651327339da643b404e61c38d3a9c808b8f7bd09c5560d01ca
                              • Instruction Fuzzy Hash: 1C5187B24083859BC764EBA0D881DDFB3EDAF85310F500A2EF685D3151EF74A588CB5A
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006A86FF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: eed12c18a21aa8588fbf3e532bf1eff6abfd44d04ec7f35cb7c6e6e25b42604c
                              • Instruction ID: a1faca57113cd3f97a0d717f3d21765ea5ef8c8edd7fca362705341e8a0ee480
                              • Opcode Fuzzy Hash: eed12c18a21aa8588fbf3e532bf1eff6abfd44d04ec7f35cb7c6e6e25b42604c
                              • Instruction Fuzzy Hash: 67517B30500254BEEB24BB289C85FAD7BA7AB06320F601125F951E72A1CF76EE808E55
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0065C2F7
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0065C319
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0065C331
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0065C34F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0065C370
                              • DestroyCursor.USER32(00000000), ref: 0065C37F
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0065C39C
                              • DestroyCursor.USER32(?), ref: 0065C3AB
                                • Part of subcall function 006AA4AF: DeleteObject.GDI32(00000000), ref: 006AA4E8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CursorDestroyExtractIconImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2975913752-0
                              • Opcode ID: 2e097d0e7dbf30a0673d0f44a7c273de4610f65dcd7d47717623f47a85e94488
                              • Instruction ID: d71381f5483d9819dcc2dea353b26732c86c2dc0cf07c25f0f25514785ef602d
                              • Opcode Fuzzy Hash: 2e097d0e7dbf30a0673d0f44a7c273de4610f65dcd7d47717623f47a85e94488
                              • Instruction Fuzzy Hash: 69516A70A0071AAFDB20DF64DC55FAA3BA6EB09326F104528F902972A0DB70ED91DF50
                              APIs
                                • Part of subcall function 0067A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0067A84C
                                • Part of subcall function 0067A82C: GetCurrentThreadId.KERNEL32 ref: 0067A853
                                • Part of subcall function 0067A82C: AttachThreadInput.USER32(00000000,?,00679683,?,00000001), ref: 0067A85A
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0067968E
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006796AB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006796AE
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 006796B7
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006796D5
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006796D8
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 006796E1
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006796F8
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006796FB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: e981f5e43a7dcf7e82743690ff60cff511a8ddb32bacf0f534beae29329aa034
                              • Instruction ID: 3cb106413be801f00b4312ad8b1d919fd7d863c7ab0b6f87d6454ceca986b2b5
                              • Opcode Fuzzy Hash: e981f5e43a7dcf7e82743690ff60cff511a8ddb32bacf0f534beae29329aa034
                              • Instruction Fuzzy Hash: F911E571910618BEF7106FA0DC89F6A3B1EEB4D750F102429F244AB0E0C9F26C11DEA9
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 0067892A
                              • RtlAllocateHeap.NTDLL(00000000), ref: 00678931
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00678946
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 0067894E
                              • DuplicateHandle.KERNEL32(00000000), ref: 00678951
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002), ref: 00678961
                              • GetCurrentProcess.KERNEL32(?,00000000), ref: 00678969
                              • DuplicateHandle.KERNEL32(00000000), ref: 0067896C
                              • CreateThread.KERNEL32(00000000,00000000,00678992,00000000,00000000,00000000), ref: 00678986
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                              • String ID:
                              • API String ID: 1422014791-0
                              • Opcode ID: c2156b1f92b0f8bfaee2774497119548efec9120d9ab7721abceb1ef40d12b6a
                              • Instruction ID: c313141eab276b7832f91a906c1ed67f2edbd01856eecead618dd4cb0ee5c89d
                              • Opcode Fuzzy Hash: c2156b1f92b0f8bfaee2774497119548efec9120d9ab7721abceb1ef40d12b6a
                              • Instruction Fuzzy Hash: 2C01A8B5240308FFE760ABA5DC4DF6B3BADEB89711F419421FA05DB1A1DA70AC008E21
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: c83057277cb25ff294649216ae763c7c7f44b2ca9780121024cc8265cf9eaaa8
                              • Instruction ID: 0b6ec4045dcc875dff60abea84fb2b234c6ee714e91b5a1d8f14807f0d405c14
                              • Opcode Fuzzy Hash: c83057277cb25ff294649216ae763c7c7f44b2ca9780121024cc8265cf9eaaa8
                              • Instruction Fuzzy Hash: 89C18171A0021A9BDF14DF98D884AEEB7FAFF48314F14846DE905A7781E770AD45CBA0
                              APIs
                                • Part of subcall function 0067710A: CLSIDFromProgID.COMBASE ref: 00677127
                                • Part of subcall function 0067710A: ProgIDFromCLSID.COMBASE(?,00000000), ref: 00677142
                                • Part of subcall function 0067710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00677044,80070057,?,?), ref: 00677150
                                • Part of subcall function 0067710A: CoTaskMemFree.COMBASE(00000000), ref: 00677160
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00699806
                              • _memset.LIBCMT ref: 00699813
                              • _memset.LIBCMT ref: 00699956
                              • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,00000000), ref: 00699982
                              • CoTaskMemFree.COMBASE(?), ref: 0069998D
                              Strings
                              • NULL Pointer assignment, xrefs: 006999DB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: bb977c76fd307b3b08e89c413aea5af7364822b32fef1ff5d85def68b2e312e9
                              • Instruction ID: a96b61598baa10f2f198459ba3a648733516b036362180e6f4cbded304f2869b
                              • Opcode Fuzzy Hash: bb977c76fd307b3b08e89c413aea5af7364822b32fef1ff5d85def68b2e312e9
                              • Instruction Fuzzy Hash: 22911671D00229ABDF10DFA5DC45EDEBBBAAF09310F20415AF519A7291DB71AA44CFA0
                              APIs
                                • Part of subcall function 00683C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00683C7A
                                • Part of subcall function 00683C55: Process32FirstW.KERNEL32(00000000,?), ref: 00683C88
                                • Part of subcall function 00683C55: CloseHandle.KERNEL32(00000000), ref: 00683D52
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0069E9A4
                              • GetLastError.KERNEL32 ref: 0069E9B7
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0069E9E6
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0069EA63
                              • GetLastError.KERNEL32(00000000), ref: 0069EA6E
                              • CloseHandle.KERNEL32(00000000), ref: 0069EAA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: e425acbc3759d443eb295ea4ca55071b89acef195f868bc0006102b87393e254
                              • Instruction ID: 229b283082ba71bf006e9da807f170cc21b8f63efacdf6b6c55cef28586e905a
                              • Opcode Fuzzy Hash: e425acbc3759d443eb295ea4ca55071b89acef195f868bc0006102b87393e254
                              • Instruction Fuzzy Hash: 95418A716002019FDB14EF54D895BADB7A6AF81314F08845CF9469B3D2CB76A805CF9A
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 00683033
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 01a1258ed67c3a70ea29eeb4bb3007c4ee619e5c0b99330f70c88104ae6e67cc
                              • Instruction ID: 0a72090bf74c5a780a97eda011cb4b769ddedb9562bf7795a0ab2d40c0012628
                              • Opcode Fuzzy Hash: 01a1258ed67c3a70ea29eeb4bb3007c4ee619e5c0b99330f70c88104ae6e67cc
                              • Instruction Fuzzy Hash: C8112731748357BEE714BB54EC42CAB779FDF19720B20012AFA00A6382DBB1AF4057A5
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00684312
                              • LoadStringW.USER32(00000000), ref: 00684319
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0068432F
                              • LoadStringW.USER32(00000000), ref: 00684336
                              • _wprintf.LIBCMT ref: 0068435C
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0068437A
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 00684357
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: e34bef94b272b5503b715f240a239a30d7648f930345dbf923cbbd2f89fc9935
                              • Instruction ID: 0ccd2dd472e6d31dd414aea5ed833102f8b44dd296d73b61de1ffd07242acef2
                              • Opcode Fuzzy Hash: e34bef94b272b5503b715f240a239a30d7648f930345dbf923cbbd2f89fc9935
                              • Instruction Fuzzy Hash: 8F01A2F2840208BFE750BBE0DD89EE7776DDB09300F0015A1B705E2111EA706E854F75
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0065C1C7,00000004,00000000,00000000,00000000), ref: 00622ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0065C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00622B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0065C1C7,00000004,00000000,00000000,00000000), ref: 0065C21A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0065C1C7,00000004,00000000,00000000,00000000), ref: 0065C286
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: dd74330f0a3ad2cd98a99529353fabb8d644a25c67af610728ea93679de8b1d0
                              • Instruction ID: e897307dcaf9aeb8865a271ceff322470f1423061458729c182a40969c6c5d6e
                              • Opcode Fuzzy Hash: dd74330f0a3ad2cd98a99529353fabb8d644a25c67af610728ea93679de8b1d0
                              • Instruction Fuzzy Hash: 53414D30204F91BEC7359B28FCA87AB7BD3AB46315F14942DE44746A60C635A886DF11
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 006870DD
                                • Part of subcall function 00640DB6: std::exception::exception.LIBCMT ref: 00640DEC
                                • Part of subcall function 00640DB6: __CxxThrowException@8.LIBCMT ref: 00640E01
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00687114
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00687130
                              • _memmove.LIBCMT ref: 0068717E
                              • _memmove.LIBCMT ref: 0068719B
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 006871AA
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006871BF
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 006871DE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: ed995f1fd168db70ead5fadea607f81ce560d77a236977caee7234df16caaad5
                              • Instruction ID: 1cef7e9c73e8cf84384f0bfd7bbf5039d96448ebb08f32e0a60254a786b1dfae
                              • Opcode Fuzzy Hash: ed995f1fd168db70ead5fadea607f81ce560d77a236977caee7234df16caaad5
                              • Instruction Fuzzy Hash: A2317031900215EBDB50EFA4DC85AAEB77AEF45710F1441B9F904AB246DB30EE14CB65
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 006A61EB
                              • GetDC.USER32(00000000), ref: 006A61F3
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006A61FE
                              • ReleaseDC.USER32(00000000,00000000), ref: 006A620A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 006A6246
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 006A6257
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,006A902A,?,?,000000FF,00000000,?,000000FF,?), ref: 006A6291
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006A62B1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: 8e459d20c058537f1852a3fff408cb5d3e618373e002084a47e20a6f2cecfb54
                              • Instruction ID: 759c2eef592ddb361a695049fc793ec4ecf4b221c24df7ab1cc422a7da0b1f89
                              • Opcode Fuzzy Hash: 8e459d20c058537f1852a3fff408cb5d3e618373e002084a47e20a6f2cecfb54
                              • Instruction Fuzzy Hash: 753171721012107FEB115F50CC4AFEB3BAAEF4A755F085065FE089A292C675AC41CF75
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 854f517c5de8287809ee8e70b96f01f794f61381fa4d78ef0ac1b09b4a45ddd1
                              • Instruction ID: 7e662c882a9078fb6fca041aeb61932a1d78a25b7a3ea4dba569b1ecfd99c302
                              • Opcode Fuzzy Hash: 854f517c5de8287809ee8e70b96f01f794f61381fa4d78ef0ac1b09b4a45ddd1
                              • Instruction Fuzzy Hash: 9A719E30904519EFCB04DF98DC48AFEBBBAFF86310F108159F915AA251C734AA52CF65
                              APIs
                              • IsWindow.USER32(01512670), ref: 006AB3EB
                              • IsWindowEnabled.USER32(01512670), ref: 006AB3F7
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 006AB4DB
                              • SendMessageW.USER32(01512670,000000B0,?,?), ref: 006AB512
                              • IsDlgButtonChecked.USER32(?,?), ref: 006AB54F
                              • GetWindowLongW.USER32(01512670,000000EC), ref: 006AB571
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 006AB589
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: c5a4691d39baface497b0da9f905672bf8626e394cbdd4b4e913b2ea2fbe6dff
                              • Instruction ID: af0c029c6dea43644c6698ae30420bc80923edb102838336c74a4ac0f16b323e
                              • Opcode Fuzzy Hash: c5a4691d39baface497b0da9f905672bf8626e394cbdd4b4e913b2ea2fbe6dff
                              • Instruction Fuzzy Hash: 31716834605204AFEF20AF65C894BEA7BEBEB0B300F146059E956973A7C732AD51DF50
                              APIs
                              • _memset.LIBCMT ref: 0069F448
                              • _memset.LIBCMT ref: 0069F511
                              • ShellExecuteExW.SHELL32(?), ref: 0069F556
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                                • Part of subcall function 0063FC86: _wcscpy.LIBCMT ref: 0063FCA9
                              • GetProcessId.KERNEL32(00000000), ref: 0069F5CD
                              • CloseHandle.KERNEL32(00000000), ref: 0069F5FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: 469a95018e21ef19e1a6d73c47832c96a0b5184e9f92d5b92a71733b568aaa72
                              • Instruction ID: 3f83e0594195dd0790e1a65f97363b2152d527e92822d4598c5377bcd6bbd481
                              • Opcode Fuzzy Hash: 469a95018e21ef19e1a6d73c47832c96a0b5184e9f92d5b92a71733b568aaa72
                              • Instruction Fuzzy Hash: 5D617975A006299FCF04EFA4C4819AEBBB6FF49310F158469E815AB751CB30AD41CF98
                              APIs
                              • GetParent.USER32(?), ref: 00680F8C
                              • GetKeyboardState.USER32(?), ref: 00680FA1
                              • SetKeyboardState.USER32(?), ref: 00681002
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00681030
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0068104F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00681095
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006810B8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: cd032e79f00a207564341547131409bdbe979224b271a7e0eba7d305efee16ce
                              • Instruction ID: 57e8740905469f46659cf2cb130e6d6aee413c74f1901aaae63b13dc403a4b88
                              • Opcode Fuzzy Hash: cd032e79f00a207564341547131409bdbe979224b271a7e0eba7d305efee16ce
                              • Instruction Fuzzy Hash: 2B51D3605046D539FB3663348C15BF6BEAF5B07304F088A89E2D88A9D3C699ECCAD751
                              APIs
                              • GetParent.USER32(00000000), ref: 00680DA5
                              • GetKeyboardState.USER32(?), ref: 00680DBA
                              • SetKeyboardState.USER32(?), ref: 00680E1B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00680E47
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00680E64
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00680EA8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00680EC9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 7444df41fcb8fadcbd0756b928533e0dc6748e998c934902f1481f01fc4ae5b6
                              • Instruction ID: 744c3b67b03a4ed9cef68f0c9e6a93ad3c8e41cf58521fd076232787c40d3523
                              • Opcode Fuzzy Hash: 7444df41fcb8fadcbd0756b928533e0dc6748e998c934902f1481f01fc4ae5b6
                              • Instruction Fuzzy Hash: 795104A05046D53DFB72A3648C55BBA7EAA5F06300F088E88E1D48A9C2C395EC8DD751
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: e323a1c0835ca24538203384ad122820b913bd50d2ad215dc94480531ed9e016
                              • Instruction ID: 8535b5b911666926bdfa0947689cbfa78690b00546b10fdcaa45a79352ef6fe0
                              • Opcode Fuzzy Hash: e323a1c0835ca24538203384ad122820b913bd50d2ad215dc94480531ed9e016
                              • Instruction Fuzzy Hash: 35419065C1061476CB51FBF48886ACFB3BADF04310F50896AF509E3221FB34A795C7AA
                              APIs
                                • Part of subcall function 0068466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00683697,?), ref: 0068468B
                                • Part of subcall function 0068466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00683697,?), ref: 006846A4
                              • lstrcmpiW.KERNEL32(?,?), ref: 006836B7
                              • _wcscmp.LIBCMT ref: 006836D3
                              • MoveFileW.KERNEL32(?,?), ref: 006836EB
                              • _wcscat.LIBCMT ref: 00683733
                              • SHFileOperationW.SHELL32(?), ref: 0068379F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: b889670066da2c11bcf2e90630763512fde85663df91e6629a4647f5af89616e
                              • Instruction ID: 9f057983693d810b4434c9fe5462c5b5dd70fd420ecabd3c19ad80e7057b83e1
                              • Opcode Fuzzy Hash: b889670066da2c11bcf2e90630763512fde85663df91e6629a4647f5af89616e
                              • Instruction Fuzzy Hash: 6741B171508345AEC795FF64C441ADFB7E9EF89740F000A2EF49AC3251EA34D689CB5A
                              APIs
                              • _memset.LIBCMT ref: 006A72AA
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006A7351
                              • IsMenu.USER32(?), ref: 006A7369
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006A73B1
                              • DrawMenuBar.USER32 ref: 006A73C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: 1ef317f5a22627461e33c5d747450aa036285e036ea2901b9331ef2ed6664f5e
                              • Instruction ID: 521ad939028b149c593abf3e03a777e51ac6af47e93d31638fd0e9f1ee3285b8
                              • Opcode Fuzzy Hash: 1ef317f5a22627461e33c5d747450aa036285e036ea2901b9331ef2ed6664f5e
                              • Instruction Fuzzy Hash: 35412275A00208AFDF20EF90D884AAABBEAEF0A315F159429FD05AB250D730AD14DF50
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 006A0FD4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A0FFE
                              • FreeLibrary.KERNEL32(00000000), ref: 006A10B5
                                • Part of subcall function 006A0FA5: RegCloseKey.ADVAPI32(?), ref: 006A101B
                                • Part of subcall function 006A0FA5: FreeLibrary.KERNEL32(?), ref: 006A106D
                                • Part of subcall function 006A0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 006A1090
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 006A1058
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: 8eb802f412f3ac4dbf3b78095fd1a04e8064be768a3b223283a4e71f7b75c798
                              • Instruction ID: b578683819a43612c39ec21064c3325f00651502cf733fdc39b653c5dd018938
                              • Opcode Fuzzy Hash: 8eb802f412f3ac4dbf3b78095fd1a04e8064be768a3b223283a4e71f7b75c798
                              • Instruction Fuzzy Hash: 87312F71900109BFEB15AF90DC89EFFB7BDEF0A300F000169E501E6241DA746E859EA5
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006A62EC
                              • GetWindowLongW.USER32(01512670,000000F0), ref: 006A631F
                              • GetWindowLongW.USER32(01512670,000000F0), ref: 006A6354
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 006A6386
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006A63B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 006A63C1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006A63DB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 5d113b94918ac03ecc7ebb2a460f24d3e46904bb9cbccfc11362563f30369c19
                              • Instruction ID: 203aff8eec79933ef509914d1ef277fadb9c6cb8f1e3c0a3df3225f7b567af8e
                              • Opcode Fuzzy Hash: 5d113b94918ac03ecc7ebb2a460f24d3e46904bb9cbccfc11362563f30369c19
                              • Instruction Fuzzy Hash: 2531FF34640290EFDB20AF58DC84F9637E2FB4A714F1961A8F5518F2B2CB61AC419F51
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067DB2E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067DB54
                              • SysAllocString.OLEAUT32(00000000), ref: 0067DB57
                              • SysAllocString.OLEAUT32(?), ref: 0067DB75
                              • SysFreeString.OLEAUT32(?), ref: 0067DB7E
                              • StringFromGUID2.COMBASE(?,?,00000028), ref: 0067DBA3
                              • SysAllocString.OLEAUT32(?), ref: 0067DBB1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 7669dc6dba1e1ac3ca2e4a3d7896b9655126d4d43965e62a5fc8e4cd50cc7804
                              • Instruction ID: 3aa30b2f5a7d8b57757b3115d45e7f64e2f9b97901b771bd788c5dc79f68f139
                              • Opcode Fuzzy Hash: 7669dc6dba1e1ac3ca2e4a3d7896b9655126d4d43965e62a5fc8e4cd50cc7804
                              • Instruction Fuzzy Hash: B8217176600219AFDB10AFB8DC84CBB73AEEF09760B018525F918DB291D670AC418B64
                              APIs
                                • Part of subcall function 00697D8B: inet_addr.WS2_32(00000000), ref: 00697DB6
                              • socket.WS2_32(00000002,00000001,00000006), ref: 006961C6
                              • WSAGetLastError.WS2_32(00000000), ref: 006961D5
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 0069620E
                              • connect.WSOCK32(00000000,?,00000010), ref: 00696217
                              • WSAGetLastError.WS2_32 ref: 00696221
                              • closesocket.WS2_32(00000000), ref: 0069624A
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00696263
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 34e708f5cd573531c51d8f4f4370fb0fd0921db307012fd682a7c3d50fe0b3fc
                              • Instruction ID: 1bb082412936253514ae1bb2964184567a53876f86718f66581417e1b6f3ab5b
                              • Opcode Fuzzy Hash: 34e708f5cd573531c51d8f4f4370fb0fd0921db307012fd682a7c3d50fe0b3fc
                              • Instruction Fuzzy Hash: 4831AF31600218AFEF10AF64DC85BBE7BAEEF45760F044029F905A7291DB74AD048BA2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: a4f82da294ba3c3883fed420be3a74e708fa572095e069d44cc9b1fd815775df
                              • Instruction ID: b54719dcb0c3059a9a84b7c81941033badd86ae7b09992faf7259d51bf50835c
                              • Opcode Fuzzy Hash: a4f82da294ba3c3883fed420be3a74e708fa572095e069d44cc9b1fd815775df
                              • Instruction Fuzzy Hash: 0721497221452266D324A734FC12EE773DBDF55340F10C03DF98987291EB919D82D399
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067DC09
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0067DC2F
                              • SysAllocString.OLEAUT32(00000000), ref: 0067DC32
                              • SysAllocString.OLEAUT32 ref: 0067DC53
                              • SysFreeString.OLEAUT32 ref: 0067DC5C
                              • StringFromGUID2.COMBASE(?,?,00000028), ref: 0067DC76
                              • SysAllocString.OLEAUT32(?), ref: 0067DC84
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: e636407ed8c778662b96db4e87b372ffa25a9e57c7e1e892169d6ba9d91df9d1
                              • Instruction ID: 24365e95b24fb5e2a740e792b06e539344ab2e0b79060e41d4bcd8e195d59539
                              • Opcode Fuzzy Hash: e636407ed8c778662b96db4e87b372ffa25a9e57c7e1e892169d6ba9d91df9d1
                              • Instruction Fuzzy Hash: BA213075604214AF9B10ABF8DC88DAB77FEEF09360B10C525F919CB261DAB4EC41CB65
                              APIs
                                • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 006A7632
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 006A763F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 006A764A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 006A7659
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 006A7665
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 1fe49cfc8fdebba832ce247e1bd971d1521ba000d46ef84e71390d0c01ffa31f
                              • Instruction ID: bd553e0a85f657973b164fe7e18070dee225b170ad4d4c25d94383f21ed6f13a
                              • Opcode Fuzzy Hash: 1fe49cfc8fdebba832ce247e1bd971d1521ba000d46ef84e71390d0c01ffa31f
                              • Instruction Fuzzy Hash: DE11C4B2110219BFEF119F64CC85EE77F6EEF09798F015115BA04A61A0CB72AC21DFA4
                              APIs
                              • __init_pointers.LIBCMT ref: 00649AE6
                                • Part of subcall function 00643187: RtlEncodePointer.NTDLL(00000000), ref: 0064318A
                                • Part of subcall function 00643187: __initp_misc_winsig.LIBCMT ref: 006431A5
                                • Part of subcall function 00643187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00649EA0
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00649EB4
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00649EC7
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00649EDA
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00649EED
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00649F00
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00649F13
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00649F26
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00649F39
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00649F4C
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00649F5F
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00649F72
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00649F85
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00649F98
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00649FAB
                                • Part of subcall function 00643187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00649FBE
                              • __mtinitlocks.LIBCMT ref: 00649AEB
                              • __mtterm.LIBCMT ref: 00649AF4
                                • Part of subcall function 00649B5C: RtlDeleteCriticalSection.NTDLL(00000000), ref: 00649C56
                                • Part of subcall function 00649B5C: _free.LIBCMT ref: 00649C5D
                                • Part of subcall function 00649B5C: RtlDeleteCriticalSection.NTDLL(02n), ref: 00649C7F
                              • __calloc_crt.LIBCMT ref: 00649B19
                              • __initptd.LIBCMT ref: 00649B3B
                              • GetCurrentThreadId.KERNEL32 ref: 00649B42
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                              • String ID:
                              • API String ID: 3567560977-0
                              • Opcode ID: fa59d3e6969e5a3e6631f39723e2e4f86206903847f1be49fd43e935df06f30b
                              • Instruction ID: ec3e05c5008202a141ea4cca7ff3cfe3a0ec1d1bd92a80a7b345806fbf125798
                              • Opcode Fuzzy Hash: fa59d3e6969e5a3e6631f39723e2e4f86206903847f1be49fd43e935df06f30b
                              • Instruction Fuzzy Hash: 1AF06232A8A71159E7B47774BC0368B2697DF02738B200A1EF4608A1D2EE11944145B8
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00643F85), ref: 00644085
                              • GetProcAddress.KERNEL32(00000000), ref: 0064408C
                              • RtlEncodePointer.NTDLL(00000000), ref: 00644097
                              • RtlDecodePointer.NTDLL(00643F85), ref: 006440B2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: 916b2735653e19e82b9ee8d8ffee7af52a22e5ccb3e39ee0ba86097ea55d6211
                              • Instruction ID: 3fe56b4b529b6bd72cb1c2dc39cbb5dc7c5b08c93d98b5b6976e16667b0b9342
                              • Opcode Fuzzy Hash: 916b2735653e19e82b9ee8d8ffee7af52a22e5ccb3e39ee0ba86097ea55d6211
                              • Instruction Fuzzy Hash: 42E09A70541351AFDB10BFA2EC4DB857AA7BB15742F106428F101E66A0CB7656449F15
                              APIs
                              • __WSAFDIsSet.WS2_32(00000000,?), ref: 00696C00
                              • WSAGetLastError.WS2_32(00000000), ref: 00696C34
                              • htons.WS2_32(?), ref: 00696CEA
                              • inet_ntoa.WS2_32(?), ref: 00696CA7
                                • Part of subcall function 0067A7E9: _strlen.LIBCMT ref: 0067A7F3
                                • Part of subcall function 0067A7E9: _memmove.LIBCMT ref: 0067A815
                              • _strlen.LIBCMT ref: 00696D44
                              • _memmove.LIBCMT ref: 00696DAD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 1102d36d2d88e6eac33cdcd06cfb6606f8b1a7936f97a7b8adcb8acb6513672c
                              • Instruction ID: fd5c690e07f888df5bf0a85975a7b73d716c13756baa051db6c110e8810b25c0
                              • Opcode Fuzzy Hash: 1102d36d2d88e6eac33cdcd06cfb6606f8b1a7936f97a7b8adcb8acb6513672c
                              • Instruction Fuzzy Hash: 3C81F071204710AFCB50EF24DC82EABB7AEAF84714F10491DF5569B292DA70ED05CBA6
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: a4097bd3aa1f2db29de2292cb6da4cddf4ce332e667ae79a614bebd342b3e3e5
                              • Instruction ID: 23611d59c02445d69d6d524a2bf37a6e328c1d525c5bb74883ee2f800525c921
                              • Opcode Fuzzy Hash: a4097bd3aa1f2db29de2292cb6da4cddf4ce332e667ae79a614bebd342b3e3e5
                              • Instruction Fuzzy Hash: 9161AD309006AA9BDF41FF60CC81EFE37A6AF45308F04461DF9156B292EB349D56CB69
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 006A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0069FDAD,?,?), ref: 006A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A02BD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A02FD
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 006A0320
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006A0349
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 006A038C
                              • RegCloseKey.ADVAPI32(00000000), ref: 006A0399
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: 85e72174ca7c04f5190d4b3fcf63097b5f64d7a1e7b8649a28ab2b91d05c6710
                              • Instruction ID: 455028460df54ae4cc27d2cc50a0d382dfaf3fa642a09cf48702528f1bc5a1bf
                              • Opcode Fuzzy Hash: 85e72174ca7c04f5190d4b3fcf63097b5f64d7a1e7b8649a28ab2b91d05c6710
                              • Instruction Fuzzy Hash: A7515831108201AFDB50EF64D895EAABBEAFF86314F04491DF585872A2DB31E905CF56
                              APIs
                              • GetMenu.USER32(?), ref: 006A57FB
                              • GetMenuItemCount.USER32(00000000), ref: 006A5832
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 006A585A
                              • GetMenuItemID.USER32(?,?), ref: 006A58C9
                              • GetSubMenu.USER32(?,?), ref: 006A58D7
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 006A5928
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: 6161c74d8946684828cc6d09e68d2c4e39d2ebd3da16ec440b2fd67fdbb5e9b0
                              • Instruction ID: b7af39619926017521697e097ab5b651e02d17029cdcc652c5e5fad047974d21
                              • Opcode Fuzzy Hash: 6161c74d8946684828cc6d09e68d2c4e39d2ebd3da16ec440b2fd67fdbb5e9b0
                              • Instruction Fuzzy Hash: 6A516D35E00A25EFCF51EFA4C8459AEB7B6EF49320F144469E812BB351CB34AE418F94
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0067EF06
                              • VariantClear.OLEAUT32(00000013), ref: 0067EF78
                              • VariantClear.OLEAUT32(00000000), ref: 0067EFD3
                              • _memmove.LIBCMT ref: 0067EFFD
                              • VariantClear.OLEAUT32(?), ref: 0067F04A
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0067F078
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 24ceff4c54742d91a9fef9f27c07f4390cb914351a44581edef69e396c5633dd
                              • Instruction ID: e5b54a2158aef4796c734bcba351af4e34de7b00e22304efe1c1f3d2e35298aa
                              • Opcode Fuzzy Hash: 24ceff4c54742d91a9fef9f27c07f4390cb914351a44581edef69e396c5633dd
                              • Instruction Fuzzy Hash: 7C5154B5A00209EFCB10DF58C890EAAB7B9FF4D310B15856AE949DB301E335E911CFA0
                              APIs
                              • _memset.LIBCMT ref: 00682258
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006822A3
                              • IsMenu.USER32(00000000), ref: 006822C3
                              • CreatePopupMenu.USER32 ref: 006822F7
                              • GetMenuItemCount.USER32(000000FF), ref: 00682355
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00682386
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 436edc868300fcffcbc328d12de4ec282420a528c7b703c5f126b01b9babbee5
                              • Instruction ID: b8f63a9e5371bac4d67a533dcf637671f5db659cc8d4ea0f9cfc181e93cba41f
                              • Opcode Fuzzy Hash: 436edc868300fcffcbc328d12de4ec282420a528c7b703c5f126b01b9babbee5
                              • Instruction Fuzzy Hash: 7E519E70A0020ADFDF21EF68D8B8BEDBBF6BF45314F104229E851A7290D7749A45CB51
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 0062179A
                              • GetWindowRect.USER32(?,?), ref: 006217FE
                              • ScreenToClient.USER32(?,?), ref: 0062181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0062182C
                              • EndPaint.USER32(?,?), ref: 00621876
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: eeb5237df91aa21b80c8d20f7f4ff2fdc868c0a2b70410a0e9a22fabc340b64e
                              • Instruction ID: 86b4ed3640d28c97e36158e7c1ebf91237b74cd4b4406036228fbaddf5c3a7ab
                              • Opcode Fuzzy Hash: eeb5237df91aa21b80c8d20f7f4ff2fdc868c0a2b70410a0e9a22fabc340b64e
                              • Instruction Fuzzy Hash: 2241C130104B50AFC710EF24DCC4FB67BEAEB56324F141268F9A58B2A1C730A845DF62
                              APIs
                              • ShowWindow.USER32(006E57B0,00000000,01512670,?,?,006E57B0,?,006AB5A8,?,?), ref: 006AB712
                              • EnableWindow.USER32(00000000,00000000), ref: 006AB736
                              • ShowWindow.USER32(006E57B0,00000000,01512670,?,?,006E57B0,?,006AB5A8,?,?), ref: 006AB796
                              • ShowWindow.USER32(00000000,00000004,?,006AB5A8,?,?), ref: 006AB7A8
                              • EnableWindow.USER32(00000000,00000001), ref: 006AB7CC
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 006AB7EF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: efc2247b30c1d91939385ea52aff2f30b0340ab16a482a9fcade70e69ff390f5
                              • Instruction ID: 21262fc8c58e319c6366422d986f261cdd13fb7e06cce8a69f97b41758c69070
                              • Opcode Fuzzy Hash: efc2247b30c1d91939385ea52aff2f30b0340ab16a482a9fcade70e69ff390f5
                              • Instruction Fuzzy Hash: 0F414B34600240AFDB26EF24D499BD4BBE2FB46310F1851A9E9488F6A3C7B1EC56DF51
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00694E41,?,?,00000000,00000001), ref: 006970AC
                                • Part of subcall function 006939A0: GetWindowRect.USER32(?,?), ref: 006939B3
                              • GetDesktopWindow.USER32 ref: 006970D6
                              • GetWindowRect.USER32(00000000), ref: 006970DD
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0069710F
                                • Part of subcall function 00685244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006852BC
                              • GetCursorPos.USER32(?), ref: 0069713B
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00697199
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: 8331ba7524dba4965f5088044e976c8e07f1c7c37d16b7afe3c75aa066042c16
                              • Instruction ID: b41232dd88eb760a2f9f27c169e93ab01b55ac3946ed41056cc011df374a98fd
                              • Opcode Fuzzy Hash: 8331ba7524dba4965f5088044e976c8e07f1c7c37d16b7afe3c75aa066042c16
                              • Instruction Fuzzy Hash: 3931D272509305ABDB20EF54C849B9BB7EAFF89314F040919F58597291DA30EA09CB92
                              APIs
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                                • Part of subcall function 0063FC86: _wcscpy.LIBCMT ref: 0063FCA9
                              • _wcstok.LIBCMT ref: 0068EC94
                              • _wcscpy.LIBCMT ref: 0068ED23
                              • _memset.LIBCMT ref: 0068ED56
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 69d2b5873345befe43dfaa09110a877e5a1366be6bb7cd4c1c874d0dd4d79f8f
                              • Instruction ID: eb776ddf910d5a97129e652e66ca358ab8860eb1902c6eeb58950fc93372118f
                              • Opcode Fuzzy Hash: 69d2b5873345befe43dfaa09110a877e5a1366be6bb7cd4c1c874d0dd4d79f8f
                              • Instruction Fuzzy Hash: CCC18E316087519FC7A4EF24D845E9AB7E2BF85310F00492DF8999B2A2DB31EC45CF56
                              APIs
                                • Part of subcall function 006780A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006780C0
                                • Part of subcall function 006780A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006780CA
                                • Part of subcall function 006780A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006780D9
                                • Part of subcall function 006780A9: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 006780E0
                                • Part of subcall function 006780A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006780F6
                              • GetLengthSid.ADVAPI32(?,00000000,0067842F), ref: 006788CA
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006788D6
                              • RtlAllocateHeap.NTDLL(00000000), ref: 006788DD
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 006788F6
                              • GetProcessHeap.KERNEL32(00000000,00000000,0067842F), ref: 0067890A
                              • HeapFree.KERNEL32(00000000), ref: 00678911
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 169236558-0
                              • Opcode ID: 0902058155886a10e7e45b4dc3de20bc6623041051d03d5924f96a4ae800bb9d
                              • Instruction ID: 6de13139a6e53c5d055742016ddba3272d50b36310bc7c0f2f9f4d695e11d29b
                              • Opcode Fuzzy Hash: 0902058155886a10e7e45b4dc3de20bc6623041051d03d5924f96a4ae800bb9d
                              • Instruction Fuzzy Hash: F911B131651209FFDB109FA8DC09BFE7B6AEB45311F108168E98997210CB32AD00DF62
                              APIs
                              • GetDC.USER32(00000000), ref: 0067B7B5
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0067B7C6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0067B7CD
                              • ReleaseDC.USER32(00000000,00000000), ref: 0067B7D5
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0067B7EC
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0067B7FE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: a1d30639d9e52ae881a67c5326ba7799b6abef957cc9f61b2905e91f5d1db8e5
                              • Instruction ID: 86bb9120ad456bb2e177708854f4429da6fb292fb251142d3ed835ae2f454650
                              • Opcode Fuzzy Hash: a1d30639d9e52ae881a67c5326ba7799b6abef957cc9f61b2905e91f5d1db8e5
                              • Instruction Fuzzy Hash: B8018475E00209BBEB10ABE69C45B5EBFB9EB49311F009075FA08A7391D6719C00CF91
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00640193
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0064019B
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006401A6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006401B1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 006401B9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 006401C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: d7d16e1cfe0facd87f7546e9b105cad5cc9d3cc573c800b72ee1b4386cfa2dcb
                              • Instruction ID: 9b170cead01816f48775bddff2091ed510237b8129ec6e92bc15075a8bf64a23
                              • Opcode Fuzzy Hash: d7d16e1cfe0facd87f7546e9b105cad5cc9d3cc573c800b72ee1b4386cfa2dcb
                              • Instruction Fuzzy Hash: 15016CB09017597DE3009F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CFE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006853F9
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0068540F
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0068541E
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0068542D
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00685437
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0068543E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: 939fd405aa3fe686849e6b71365c9f2e7d73dc10746b32b84c31d1626cd400bb
                              • Instruction ID: f3a0cdd420ef09fe85bef568c8d7966fbed167dcaf3bc4f8c12de09b97834fec
                              • Opcode Fuzzy Hash: 939fd405aa3fe686849e6b71365c9f2e7d73dc10746b32b84c31d1626cd400bb
                              • Instruction Fuzzy Hash: 83F01D32241558BBE7316BE2DC0DEEB7A7DEBC7B11F001169FA05D10519AA12A018AB6
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 00687243
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00687254
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00630EE4,?,?), ref: 00687261
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00630EE4,?,?), ref: 0068726E
                                • Part of subcall function 00686C35: CloseHandle.KERNEL32(00000000,?,0068727B,?,00630EE4,?,?), ref: 00686C3F
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00687281
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00687288
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 82efacc6de67814584512cc27de4b84f8d9db9da01fe4d8b1d5eefa2f78200c7
                              • Instruction ID: 6d2051bdb58148e81017499cd3f7584ddca11c85bf29849ea8ccd497e836a172
                              • Opcode Fuzzy Hash: 82efacc6de67814584512cc27de4b84f8d9db9da01fe4d8b1d5eefa2f78200c7
                              • Instruction Fuzzy Hash: F2F05E36540612EBD7623BE4ED4CAEA772BEF46702B101631F503910A0DB766A01CF51
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00698613
                              • CharUpperBuffW.USER32(?,?), ref: 00698722
                              • VariantClear.OLEAUT32(?), ref: 0069889A
                                • Part of subcall function 00687562: VariantInit.OLEAUT32(00000000), ref: 006875A2
                                • Part of subcall function 00687562: VariantCopy.OLEAUT32(00000000,?), ref: 006875AB
                                • Part of subcall function 00687562: VariantClear.OLEAUT32(00000000), ref: 006875B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: c433ebc22a470ba2ae5f53fb5b34286b93c52b99f9a47535cc07fd904a36f043
                              • Instruction ID: 2d154a699428f45d4810960e5a35ab8b6a8f6ad080598e06f3f9e9ec47be6e56
                              • Opcode Fuzzy Hash: c433ebc22a470ba2ae5f53fb5b34286b93c52b99f9a47535cc07fd904a36f043
                              • Instruction Fuzzy Hash: 22918170A047019FCB50DF24C48495AB7EAEF8A714F14896EF89A8B361DB31ED45CF62
                              APIs
                                • Part of subcall function 0063FC86: _wcscpy.LIBCMT ref: 0063FCA9
                              • _memset.LIBCMT ref: 00682B87
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00682BB6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00682C69
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00682C97
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: 3d2ed9edaa4af86909404961016a998b981c937bafc3b691d48191f4de9b1146
                              • Instruction ID: 33c303742a97b017d4f64c511241e795ea3129d0ce5568d5c3ee221398b81001
                              • Opcode Fuzzy Hash: 3d2ed9edaa4af86909404961016a998b981c937bafc3b691d48191f4de9b1146
                              • Instruction Fuzzy Hash: 9C51DE715093029BD7A4AF28D865ABFB7EAEF59314F040B2DF891D22D0DB70CD048B56
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove$_free
                              • String ID: 3cc$_c
                              • API String ID: 2620147621-1111051329
                              • Opcode ID: 8f233d3cc3cc69c38f6e163c5f9402b6e32ee729320b1efba29259b51028e695
                              • Instruction ID: 950d898abc75073d1edd5b6a86c164c6e387b2f504affc86a204c84a97743545
                              • Opcode Fuzzy Hash: 8f233d3cc3cc69c38f6e163c5f9402b6e32ee729320b1efba29259b51028e695
                              • Instruction Fuzzy Hash: 10515B71A083519FDB65CF28C851B6ABBF6EF85310F48882DE989C7351DB31E945CB82
                              APIs
                              • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 0067D5D4
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0067D60A
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0067D61B
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0067D69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 53d9b035e2fee833f621f9d1650e55a3a0bf4519afd13469ba44ee347e0c35c1
                              • Instruction ID: 50e195248313518907e73ea6b9b57e9758db63305605e38e3f0c94f2bf925154
                              • Opcode Fuzzy Hash: 53d9b035e2fee833f621f9d1650e55a3a0bf4519afd13469ba44ee347e0c35c1
                              • Instruction Fuzzy Hash: 7F416BB1600204EFDB15DF64C884A9ABBBAEF85314F1589ADED0D9F205D7B1DD44CBA0
                              APIs
                              • _memset.LIBCMT ref: 006827C0
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006827DC
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00682822
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006E5890,00000000), ref: 0068286B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: 6981966ae49cb01b37e546307ea74b85ad297bd88c3c96a40fb4e1fd10b49234
                              • Instruction ID: 8230fb6b744dc1201f1e21fe6833179f38fcabdea69d404c2d93624a901fc133
                              • Opcode Fuzzy Hash: 6981966ae49cb01b37e546307ea74b85ad297bd88c3c96a40fb4e1fd10b49234
                              • Instruction Fuzzy Hash: 3E41A2B0604302AFDB20EF24C894B5ABBE6EF85314F144A2EF56597391D730A809CB56
                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0069D7C5
                                • Part of subcall function 0062784B: _memmove.LIBCMT ref: 00627899
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: 88b8450aa4d961ef7caa3a356f0722434f1f659ed47e54e366a8674a5fe1eb97
                              • Instruction ID: 7090993f51f207caa462c4857164f6f3373901bd30fac93a3fc3eb1f4f646b02
                              • Opcode Fuzzy Hash: 88b8450aa4d961ef7caa3a356f0722434f1f659ed47e54e366a8674a5fe1eb97
                              • Instruction Fuzzy Hash: FC31B271904615ABCF10EF54CD519FEB7BAFF05320B10862EE865977D2DB31A905CB90
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00678F14
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00678F27
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00678F57
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: 2a1a5dad9bd30ff0574467c6687e8e7d31177a1668a080e6fc0d7fe9d08fe3ac
                              • Instruction ID: 17b783d72ba3da089c89e48a41d7b5c5e6c2b40654e9eba54c4de70d9cf70e7c
                              • Opcode Fuzzy Hash: 2a1a5dad9bd30ff0574467c6687e8e7d31177a1668a080e6fc0d7fe9d08fe3ac
                              • Instruction Fuzzy Hash: A7210471A40108BEDB14ABB0DC49CFFB76BDF46360B14852EF429972E0DF395C099A60
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0069184C
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00691872
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 006918A2
                              • InternetCloseHandle.WININET(00000000), ref: 006918E9
                                • Part of subcall function 00692483: GetLastError.KERNEL32(?,?,00691817,00000000,00000000,00000001), ref: 00692498
                                • Part of subcall function 00692483: SetEvent.KERNEL32(?,?,00691817,00000000,00000000,00000001), ref: 006924AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: 20bb029bf745e6c6b91c10d304d482f59cff4a3df71b1b2cf1b8d1c60208247a
                              • Instruction ID: 53247830d29cc2eb6b8247e47f622bbcf16322800c8f008acbc2789d82321532
                              • Opcode Fuzzy Hash: 20bb029bf745e6c6b91c10d304d482f59cff4a3df71b1b2cf1b8d1c60208247a
                              • Instruction Fuzzy Hash: 6F21C2B5500309BFEF11AF60DD85EBF77EEEB4A744F20412BF4059A640DB209E056BA5
                              APIs
                                • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 006A6461
                              • LoadLibraryW.KERNEL32(?), ref: 006A6468
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 006A647D
                              • DestroyWindow.USER32(?), ref: 006A6485
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: 7ccf663a4184a950e92c86625532e646c38af353af789639532431d9a3133a50
                              • Instruction ID: 5e43bb721e988de7733226c9622b3b107fc9013cd1759c1aeaf79f8cff6b0888
                              • Opcode Fuzzy Hash: 7ccf663a4184a950e92c86625532e646c38af353af789639532431d9a3133a50
                              • Instruction Fuzzy Hash: CC218071100205ABEF106FA4DC40EBB77EAEF5A328F189629F910962A0D7719C519FA0
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 00686DBC
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00686DEF
                              • GetStdHandle.KERNEL32(0000000C), ref: 00686E01
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00686E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 46f6c43a7fb12f475e1b6225021d9cd1ef9bcd61017d69511991e98ccd03319b
                              • Instruction ID: b91e58f5f2084c622b6a141aa4c5b97c25d7d35dfe4b854de50d59cc04ba014f
                              • Opcode Fuzzy Hash: 46f6c43a7fb12f475e1b6225021d9cd1ef9bcd61017d69511991e98ccd03319b
                              • Instruction Fuzzy Hash: E2219274600209ABDB20BF69DC04B9A77F6EF45720F204719FDA1D73D0D77099518B54
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00686E89
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00686EBB
                              • GetStdHandle.KERNEL32(000000F6), ref: 00686ECC
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00686F06
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: c5deb0fd7ea96182c688c41f83aee1672e4f5183dd2225f7c6e13d212ccd2c22
                              • Instruction ID: f74a6c15c0d07d66acc301ce95042280f6efd759627f02779025c56768f8ff22
                              • Opcode Fuzzy Hash: c5deb0fd7ea96182c688c41f83aee1672e4f5183dd2225f7c6e13d212ccd2c22
                              • Instruction Fuzzy Hash: 8821C4755043059BDB20AF69DC08AAA77EAEF45724F200B19FDA1D33D0DB70A941CB11
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0068AC54
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0068ACA8
                              • __swprintf.LIBCMT ref: 0068ACC1
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,006AF910), ref: 0068ACFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: fb4a8868dc2cb786918ab447f8dd16cca0b6c609b27f487d04538ed7aca1b916
                              • Instruction ID: 56631174d477f82ab7b3c8966273dcd18c521342521ea0e7c6d02ea78129a62c
                              • Opcode Fuzzy Hash: fb4a8868dc2cb786918ab447f8dd16cca0b6c609b27f487d04538ed7aca1b916
                              • Instruction Fuzzy Hash: AB21A130A00109AFCB50EFA4D945DEE7BB9EF89314B004069F9099B351DA71EE41CF21
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0067FCED,?,00680D40,?,00008000), ref: 0068115F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0067FCED,?,00680D40,?,00008000), ref: 00681184
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0067FCED,?,00680D40,?,00008000), ref: 0068118E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,0067FCED,?,00680D40,?,00008000), ref: 006811C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID: @h
                              • API String ID: 2875609808-2031928309
                              • Opcode ID: a97b592bc62a87e82f4564ca1166d2185eeb383ef76fddd90bae29eb0f1e426f
                              • Instruction ID: d9fcea7a5059a1c726c3ad701df681928a89ef1556cc4b8da9e6d490ad01eade
                              • Opcode Fuzzy Hash: a97b592bc62a87e82f4564ca1166d2185eeb383ef76fddd90bae29eb0f1e426f
                              • Instruction Fuzzy Hash: 40113031D0051DD7CF00AFE5D9486EEBB7EFF0A711F004565DA85B6240CB70A552CB95
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00681B19
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: 232bdf3c3bd3eb0dc867c16dbc25674eb455c71a5e85cbd6ca6c37ed2dbd3e1e
                              • Instruction ID: 07f54443f956bcf4435af38e9391c97b1b77ae170304b20e59bd31fc01aae992
                              • Opcode Fuzzy Hash: 232bdf3c3bd3eb0dc867c16dbc25674eb455c71a5e85cbd6ca6c37ed2dbd3e1e
                              • Instruction Fuzzy Hash: 72113C709402189FCF80EF94E8558EEB7B6BF26304F1045A9D955AB392EB325D06CB54
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0069EC07
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0069EC37
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0069ED6A
                              • CloseHandle.KERNEL32(?), ref: 0069EDEB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: 05813213a07026af20b74ff3ddf5d8fc639493b3112683fb33c692339152986b
                              • Instruction ID: b62e32bb5af54b19abfeb4aab31fd306908fdee9dcdf2d7a8d2fd1c740956c97
                              • Opcode Fuzzy Hash: 05813213a07026af20b74ff3ddf5d8fc639493b3112683fb33c692339152986b
                              • Instruction Fuzzy Hash: 5881C1716007109FDB60EF28D846F6AB7E6AF88710F04891DF9999B3D2D671AC04CF95
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 006A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0069FDAD,?,?), ref: 006A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006A00FD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006A013C
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 006A0183
                              • RegCloseKey.ADVAPI32(?,?), ref: 006A01AF
                              • RegCloseKey.ADVAPI32(00000000), ref: 006A01BC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: c0d60e3d56524756a207ccde7b45ddd4b3fa3e0d14675b3549b98ad2b3b91a2c
                              • Instruction ID: c3a80c13c2a79f6b19de7150af2da86b1b92e6f38ee4234d8f06f998d6789080
                              • Opcode Fuzzy Hash: c0d60e3d56524756a207ccde7b45ddd4b3fa3e0d14675b3549b98ad2b3b91a2c
                              • Instruction Fuzzy Hash: D6519D71208204AFD754EFA4D881EAAB7EAFF85304F40882DF585872A2DB31ED05CF56
                              APIs
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0069D927
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0069D9AA
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0069D9C6
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0069DA07
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0069DA21
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00687896,?,?,00000000), ref: 00625A2C
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00687896,?,?,00000000,?,?), ref: 00625A50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: e37b155869c84ff0d89336054d0a4edf5a18b7791798bebd88e40c1e7d988062
                              • Instruction ID: 92b81e938d8615ea30fdb99d7b9584f540c3c59e4185369e8f9551e195ae7941
                              • Opcode Fuzzy Hash: e37b155869c84ff0d89336054d0a4edf5a18b7791798bebd88e40c1e7d988062
                              • Instruction Fuzzy Hash: BE512735A00619DFCB40EFA8D4849ADB7FAFF59320B048069E85AAB312D731AD45CF95
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0068E61F
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0068E648
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0068E687
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0068E6AC
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0068E6B4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: 2263d5279e85b5fac2caffb0c45816aa82f0fd63d3564f46ffed7d42f0e5fd09
                              • Instruction ID: da7fe4f074edda384fcef5a686a59aa3de464c35ed9baca6fddc94690c8080d7
                              • Opcode Fuzzy Hash: 2263d5279e85b5fac2caffb0c45816aa82f0fd63d3564f46ffed7d42f0e5fd09
                              • Instruction Fuzzy Hash: 78516C35A00515DFCB40EFA4D981AAEBBF6EF49310F1484A9E809AB361CB31ED50CF64
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dea4cda28c5dab004682f628e981d084c0401172dfd828254600c62c1af930bf
                              • Instruction ID: 7ddce56e616f906edc444373e6c6eefef350fcc672d35dc3a286ea1c4f989b1f
                              • Opcode Fuzzy Hash: dea4cda28c5dab004682f628e981d084c0401172dfd828254600c62c1af930bf
                              • Instruction Fuzzy Hash: 16419135904214BBD720BFA8CC88FE9BBA6EB0B310F140166E816A73E1C730AD51DE52
                              APIs
                              • GetCursorPos.USER32(?), ref: 00622357
                              • ScreenToClient.USER32(006E57B0,?), ref: 00622374
                              • GetAsyncKeyState.USER32(00000001), ref: 00622399
                              • GetAsyncKeyState.USER32(00000002), ref: 006223A7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: d99a8aaf25ca02b9ad104c67a842dd3c6a631d0823d925975bd44ad90aeea239
                              • Instruction ID: e9ffb7fa928dc5c92ad80895d2c14433443af1740e9662db28d289bb8e3462ff
                              • Opcode Fuzzy Hash: d99a8aaf25ca02b9ad104c67a842dd3c6a631d0823d925975bd44ad90aeea239
                              • Instruction Fuzzy Hash: 4E418F35604616FFCF15DF68C844AE9BBB6FB05361F20431AF828A22A0CB35AD54DF91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006763E7
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00676433
                              • TranslateMessage.USER32(?), ref: 0067645C
                              • DispatchMessageW.USER32(?), ref: 00676466
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00676475
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 5c814508b36d4a9215b65fdfe03baa6262442f89216969c1344117ff317109cf
                              • Instruction ID: 5a9103cd786ae12ad75dd46fb06f2ab0ce1917ef0364de60e201cf52d23448a6
                              • Opcode Fuzzy Hash: 5c814508b36d4a9215b65fdfe03baa6262442f89216969c1344117ff317109cf
                              • Instruction Fuzzy Hash: 7B310730900B52AFDB64CFB0CC84BF67BEBAB01314F14E169F42AC62A4E7359849DB51
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00678A30
                              • PostMessageW.USER32(?,00000201,00000001), ref: 00678ADA
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00678AE2
                              • PostMessageW.USER32(?,00000202,00000000), ref: 00678AF0
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00678AF8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 17a293e38fd30ac223c6a6362da36a2aa3a8e96900f1689e4a1fdd364143848a
                              • Instruction ID: 33fff4dca6ce22245742fe64476b7da2ed108ec4994cafc154b33fc197526965
                              • Opcode Fuzzy Hash: 17a293e38fd30ac223c6a6362da36a2aa3a8e96900f1689e4a1fdd364143848a
                              • Instruction Fuzzy Hash: 5031AD71500219EFDB14CFA8D94CADE3BA6EB05315F10822AF929E72D1CBB09D14DB91
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0067B204
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0067B221
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0067B259
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0067B27F
                              • _wcsstr.LIBCMT ref: 0067B289
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: 38ad71fe6c922f1a7e5d9f4d43ee31efac38e967b073ba2a899359e1f27631bf
                              • Instruction ID: 5b8b979c0051f1c00fdc95838d303637cf9552942e4ab5d48d0fa80378673ac9
                              • Opcode Fuzzy Hash: 38ad71fe6c922f1a7e5d9f4d43ee31efac38e967b073ba2a899359e1f27631bf
                              • Instruction Fuzzy Hash: EF2107316052017BEB155B759C09FBF7B9ADF4A710F00913DF808DA262EF71DD4196A1
                              APIs
                                • Part of subcall function 00622612: GetWindowLongW.USER32(?,000000EB), ref: 00622623
                              • GetWindowLongW.USER32(?,000000F0), ref: 006AB192
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 006AB1B7
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 006AB1CF
                              • GetSystemMetrics.USER32(00000004), ref: 006AB1F8
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00690E90,00000000), ref: 006AB216
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: 830c385daf4cfe6b4aa77d375e07b540245a21ef64447459e3d3d6a01f688d53
                              • Instruction ID: 14a70783fdc27547c65386a6ad90ffc6f2289e8730457e2f3f829d09c75e26f8
                              • Opcode Fuzzy Hash: 830c385daf4cfe6b4aa77d375e07b540245a21ef64447459e3d3d6a01f688d53
                              • Instruction Fuzzy Hash: A121A231910261AFCB10AF78DC14BAA37A6EB06321F145739B932C72E1E7309D618F90
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00679320
                                • Part of subcall function 00627BCC: _memmove.LIBCMT ref: 00627C06
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00679352
                              • __itow.LIBCMT ref: 0067936A
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00679392
                              • __itow.LIBCMT ref: 006793A3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: 5fadc526489b37c8cd817d411de08d67057949de972e5d154a784680420ac84d
                              • Instruction ID: 42f7ea4b2874c3b240b60b9422b991be54c5bca2b66f8ba397eba19e7c1213d7
                              • Opcode Fuzzy Hash: 5fadc526489b37c8cd817d411de08d67057949de972e5d154a784680420ac84d
                              • Instruction Fuzzy Hash: D6210A31700214ABDB10AF609C85EEE7BEFEB49721F149029FD08D73D0D6708D458BA2
                              APIs
                              • IsWindow.USER32(00000000), ref: 00695A6E
                              • GetForegroundWindow.USER32 ref: 00695A85
                              • GetDC.USER32(00000000), ref: 00695AC1
                              • GetPixel.GDI32(00000000,?,00000003), ref: 00695ACD
                              • ReleaseDC.USER32(00000000,00000003), ref: 00695B08
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: 2d045b3e439f4bd427d076ddcfee59b966384366498d4100023c6f14871af822
                              • Instruction ID: 479a542d50d65aa6b6c9706b2245b197eb7c8abd42db65bac18577d4a9609b0d
                              • Opcode Fuzzy Hash: 2d045b3e439f4bd427d076ddcfee59b966384366498d4100023c6f14871af822
                              • Instruction Fuzzy Hash: 1F219F35A00514AFDB14EFA4DC84A9ABBFAEF49311F148579F80AD7362CA30AC01CF95
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0062134D
                              • SelectObject.GDI32(?,00000000), ref: 0062135C
                              • BeginPath.GDI32(?), ref: 00621373
                              • SelectObject.GDI32(?,00000000), ref: 0062139C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: ce65b723bed32cf7017c57e2658fc57e186526303c9c99f91947d2cfe5501bee
                              • Instruction ID: 7239e933c2f858c415d7e813a079f86372aee02f73e813837c27c0406db8b8e2
                              • Opcode Fuzzy Hash: ce65b723bed32cf7017c57e2658fc57e186526303c9c99f91947d2cfe5501bee
                              • Instruction Fuzzy Hash: BF219230914B64EFDB10DF55EC847AA3BABFB12315F145225F8119E1B0D3B19891CF91
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00684ABA
                              • __beginthreadex.LIBCMT ref: 00684AD8
                              • MessageBoxW.USER32(?,?,?,?), ref: 00684AED
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00684B03
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00684B0A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: bcbd1510cd442f2925f11f12fa10459a2aa38536a9ec2355cb70e1c9539cc787
                              • Instruction ID: 0346dc5b0f7df38151a4e58fa41c3c77279681e7c33286a720b96a0445d68135
                              • Opcode Fuzzy Hash: bcbd1510cd442f2925f11f12fa10459a2aa38536a9ec2355cb70e1c9539cc787
                              • Instruction Fuzzy Hash: 01114872904255BFCB00AFA89C44ADB7FAEEB45320F144369F914D3350DA71DD008BA1
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0067821E
                              • GetLastError.KERNEL32(?,00677CE2,?,?,?), ref: 00678228
                              • GetProcessHeap.KERNEL32(00000008,?,?,00677CE2,?,?,?), ref: 00678237
                              • RtlAllocateHeap.NTDLL(00000000,?,00677CE2), ref: 0067823E
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00678255
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 883493501-0
                              • Opcode ID: 31808fea3b78362568ac7b059de5521957c93b88936778102e073ebb0362e9bc
                              • Instruction ID: 28f711a27b05f99a7bc65ea952b723650ddb3de179a7a73116a0d1c6b7af6704
                              • Opcode Fuzzy Hash: 31808fea3b78362568ac7b059de5521957c93b88936778102e073ebb0362e9bc
                              • Instruction Fuzzy Hash: E3016D71340204BFDB205FA5DC4CDAB7BAEEF8A756B504469F819C3220DA319D00CEA1
                              APIs
                              • CLSIDFromProgID.COMBASE ref: 00677127
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00677142
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00677044,80070057,?,?), ref: 00677150
                              • CoTaskMemFree.COMBASE(00000000), ref: 00677160
                              • CLSIDFromString.COMBASE(?,?), ref: 0067716C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: cc4c0562b9586d1c964ae1b56e87bdb6aba9b853e925eff5326da773e24f5c80
                              • Instruction ID: d3ed7e1cd1b0fe4f5b921691bb1d356ab582e332171a708aee2bdf51f740258e
                              • Opcode Fuzzy Hash: cc4c0562b9586d1c964ae1b56e87bdb6aba9b853e925eff5326da773e24f5c80
                              • Instruction Fuzzy Hash: 25018F76601204BBDB119FA4DC44BAABBBEEF45791F188174FD08D2220EB75ED419BA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00685260
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0068526E
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00685276
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00685280
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006852BC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: bcacbdf615ef50c92a3f32da3130bde13f040073f24789ce2c777d28d1d3475e
                              • Instruction ID: 3115346dbbd497484259080957d41df098f9b903628a078826cd6deee1da16fa
                              • Opcode Fuzzy Hash: bcacbdf615ef50c92a3f32da3130bde13f040073f24789ce2c777d28d1d3475e
                              • Instruction Fuzzy Hash: F4011B31D01A19DBCF00FFE4D8599EDBB7ABB09711F400655E942B2241CF30AA558BA6
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00678121
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0067812B
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0067813A
                              • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00678141
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00678157
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: 1311948796382c99daebec635f2b2eb278ceea4c7b9aa43289895e135ca3f999
                              • Instruction ID: 1049f9aceda63d90008d36ea58aa723583401cf35c66755c9655755fec57eb08
                              • Opcode Fuzzy Hash: 1311948796382c99daebec635f2b2eb278ceea4c7b9aa43289895e135ca3f999
                              • Instruction Fuzzy Hash: FEF03C71340305AFEB111FA5EC8CEA73BAEEF4A655B404025F94987250DF61AD41DE61
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 0067C1F7
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0067C20E
                              • MessageBeep.USER32(00000000), ref: 0067C226
                              • KillTimer.USER32(?,0000040A), ref: 0067C242
                              • EndDialog.USER32(?,00000001), ref: 0067C25C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 0a31858f4bade8da4385d8a2c5eda18ea2ac3f58b0378b1bb06135ee477eb542
                              • Instruction ID: ce24bc1ef6a1f181eb702e8e122259d6e4b289dc46aed4aedf92e1d171c25a0c
                              • Opcode Fuzzy Hash: 0a31858f4bade8da4385d8a2c5eda18ea2ac3f58b0378b1bb06135ee477eb542
                              • Instruction Fuzzy Hash: E101A730404704ABEB206F90ED4EF96777ABB01706F00526DB596A14E1DBE07A448F51
                              APIs
                              • EndPath.GDI32(?), ref: 006213BF
                              • StrokeAndFillPath.GDI32(?,?,0065B888,00000000,?), ref: 006213DB
                              • SelectObject.GDI32(?,00000000), ref: 006213EE
                              • DeleteObject.GDI32 ref: 00621401
                              • StrokePath.GDI32(?), ref: 0062141C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: c835fbf3ed6a18b5e8cd03ecb28d3bf7f3cededb95049cf5caf20e348633c7e5
                              • Instruction ID: 2182309962f9e797b251825a58ab19775bbd002e87afcfbd6ae7f02e378cf9d3
                              • Opcode Fuzzy Hash: c835fbf3ed6a18b5e8cd03ecb28d3bf7f3cededb95049cf5caf20e348633c7e5
                              • Instruction Fuzzy Hash: 61F04430024B58DBDB156F56EC8C7593FE7AB1232AF08A224F46A4C1F1C77059A5DF11
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0067899D
                              • CloseHandle.KERNEL32(?), ref: 006789B2
                              • CloseHandle.KERNEL32(?), ref: 006789BA
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 006789C3
                              • HeapFree.KERNEL32(00000000), ref: 006789CA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                              • String ID:
                              • API String ID: 3751786701-0
                              • Opcode ID: c05b8c43f7f1217fb6d225d4daa9ea8026ff6902dc885d6fe52d05196a9ade90
                              • Instruction ID: ff11aa5dace3475f7f71ecd2301c3ce310222860071742df050faab2bb6fd243
                              • Opcode Fuzzy Hash: c05b8c43f7f1217fb6d225d4daa9ea8026ff6902dc885d6fe52d05196a9ade90
                              • Instruction Fuzzy Hash: 9AE05276104505FFDB012FE5EC0C95ABB6AFB8A762B509631F21981470CB32A861DF92
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0068C432
                              • CoCreateInstance.COMBASE(006B2D6C,00000000,00000001,006B2BDC,?), ref: 0068C44A
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              • CoUninitialize.COMBASE ref: 0068C6B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: cb9c0ca367b82771587a47efe575ea9bde8a517b9b4870e5f51c52980609074f
                              • Instruction ID: c7f58faf5b5d1aef0b0d2474e1199cff8c9671233a5dc67ba8e6c337c8509007
                              • Opcode Fuzzy Hash: cb9c0ca367b82771587a47efe575ea9bde8a517b9b4870e5f51c52980609074f
                              • Instruction Fuzzy Hash: 52A17B71104205AFD344EF54D881EABB7EAFF85354F004A2CF196871A2EB70EA49CF66
                              APIs
                                • Part of subcall function 00640DB6: std::exception::exception.LIBCMT ref: 00640DEC
                                • Part of subcall function 00640DB6: __CxxThrowException@8.LIBCMT ref: 00640E01
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 00627A51: _memmove.LIBCMT ref: 00627AAB
                              • __swprintf.LIBCMT ref: 00632ECD
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00632D66
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: 6c190f4089182b076e222043cdda25c01a82a9e702b20bd2e41bb4fc5b350951
                              • Instruction ID: e1d54794457ec5b8ebf77c732e90c5e5333e5702d96be1a70455fea073b1b871
                              • Opcode Fuzzy Hash: 6c190f4089182b076e222043cdda25c01a82a9e702b20bd2e41bb4fc5b350951
                              • Instruction Fuzzy Hash: 43918D71508712DFC754EF24E896CAFB7A6EF85710F00491DF4469B2A1DA30ED44CB96
                              APIs
                                • Part of subcall function 00624750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00624743,?,?,006237AE,?), ref: 00624770
                              • CoInitialize.OLE32(00000000), ref: 0068B9BB
                              • CoCreateInstance.COMBASE(006B2D6C,00000000,00000001,006B2BDC,?), ref: 0068B9D4
                              • CoUninitialize.COMBASE ref: 0068B9F1
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: b92efffa2b4bae45223836893764a8a255be6a6fd6f65bea11756432d595b6ba
                              • Instruction ID: 8012b1abf3af93002acfed5df4fb08d42e2aa9f46cd9da3b06020a8f2ec096e3
                              • Opcode Fuzzy Hash: b92efffa2b4bae45223836893764a8a255be6a6fd6f65bea11756432d595b6ba
                              • Instruction Fuzzy Hash: 1DA134756042119FCB14EF24C484DAABBE6FF89314F048A98F8999B3A1CB31EC45CF95
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 0067B4BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container$%k
                              • API String ID: 3565006973-671182982
                              • Opcode ID: 28b298c1a54debd66b415f31be06bf39e04c90e2760a80412ff9d22f39d03248
                              • Instruction ID: 91b73067303b749bf46e30074595dcf8d0516671e3735a10f17fd066f61b52a1
                              • Opcode Fuzzy Hash: 28b298c1a54debd66b415f31be06bf39e04c90e2760a80412ff9d22f39d03248
                              • Instruction Fuzzy Hash: 2E912770600601AFDB54DF64C884BAABBE6FF49710F24956EF94ACB391EB70E841CB50
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 006450AD
                                • Part of subcall function 006500F0: __87except.LIBCMT ref: 0065012B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: af35742741766342d7d8122a32e0826b821d263576cf4ebc98d3ffef1ceef4d0
                              • Instruction ID: b8d7f6e709ce0a9dc94144123ae07e389192d0d4cd78d31cdcd1bb27cb3e4be8
                              • Opcode Fuzzy Hash: af35742741766342d7d8122a32e0826b821d263576cf4ebc98d3ffef1ceef4d0
                              • Instruction Fuzzy Hash: 86515D75908A0297EB217B54C9053BE2F979B40B01F208D5DE8D6863DBDF34CDDC9A8A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: 3cc$_c
                              • API String ID: 4104443479-1111051329
                              • Opcode ID: 8689979f688c1ab7e55c1c92174f0b5a830def68ff64e7efe7dc8a04b63bada3
                              • Instruction ID: 8b7d8a7832e223deb37fd52d4002774bc2946dc050dab0252a858b1a8c287ebf
                              • Opcode Fuzzy Hash: 8689979f688c1ab7e55c1c92174f0b5a830def68ff64e7efe7dc8a04b63bada3
                              • Instruction Fuzzy Hash: 2F510C70A006199FCF64CF68D884AEEBBF2FF45304F148529E85AD7350EB31A965CB91
                              APIs
                                • Part of subcall function 006814BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00679296,?,?,00000034,00000800,?,00000034), ref: 006814E6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0067983F
                                • Part of subcall function 00681487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006792C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006814B1
                                • Part of subcall function 006813DE: GetWindowThreadProcessId.USER32(?,?), ref: 00681409
                                • Part of subcall function 006813DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0067925A,00000034,?,?,00001004,00000000,00000000), ref: 00681419
                                • Part of subcall function 006813DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0067925A,00000034,?,?,00001004,00000000,00000000), ref: 0068142F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006798AC
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006798F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 9debe2b5ebc02f3fc8b13d94da278a20c7c273bfedf818607d17c53d40f65470
                              • Instruction ID: 74d538b789b533fb9ac2ea13be93a61c661b58a4ba89e2466f404a97af07d54e
                              • Opcode Fuzzy Hash: 9debe2b5ebc02f3fc8b13d94da278a20c7c273bfedf818607d17c53d40f65470
                              • Instruction Fuzzy Hash: 0341427690021CBFDB10EFA4CC41EDEBBB9EB0A300F144159FA59B7251DA716E45CBA1
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,006AF910,00000000,?,?,?,?), ref: 006A79DF
                              • GetWindowLongW.USER32 ref: 006A79FC
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 006A7A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 8cd5c52e8d9dfd5365869d33fa19a80d0e5fe0040150fdee57f79304db18fa5d
                              • Instruction ID: b10cca1d2d710061794089b1f6cbd3d8ae05f48b4cf7a47d820729477f319cd5
                              • Opcode Fuzzy Hash: 8cd5c52e8d9dfd5365869d33fa19a80d0e5fe0040150fdee57f79304db18fa5d
                              • Instruction Fuzzy Hash: AE31AE31204606AFDB51AF78DC41BEB77AAEB0A324F208725F975922E0D731ED519F60
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 006A7461
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 006A7475
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 006A7499
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: 51f87788b3c3d8f18ce3d4d3b7b595b12421ebadfb6ab1582f9c718796d1c31c
                              • Instruction ID: 39799aa1993a080f8f2941810a67f789fd79860a452ff0c6bd82d249e2ed2324
                              • Opcode Fuzzy Hash: 51f87788b3c3d8f18ce3d4d3b7b595b12421ebadfb6ab1582f9c718796d1c31c
                              • Instruction Fuzzy Hash: A4219F32500218ABDF119FA4CC46FEA3BAAEF4D724F110214FE156B191DAB5AC519FA0
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 006A6D3B
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 006A6D4B
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 006A6D70
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 7d1a8673d30ffb19c72868e481a02297c40b84eb9bb9bb22687ae96e88b39089
                              • Instruction ID: 1ebe38020692025563dd77d3fd4a93dfd239c47ed63d40c288d81a6a1669d17d
                              • Opcode Fuzzy Hash: 7d1a8673d30ffb19c72868e481a02297c40b84eb9bb9bb22687ae96e88b39089
                              • Instruction Fuzzy Hash: FA218332610118BFDF11AF54DC45EEB37ABEF8A760F058128FA455B290C671AC518BA0
                              APIs
                              • __snwprintf.LIBCMT ref: 00693A66
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d$%k
                              • API String ID: 3506404897-183977080
                              • Opcode ID: 0eb6640033c1bc6e418e6883088b9ca51dd4af1eef2beec65d816da93f2b06b1
                              • Instruction ID: 648e05edac7fb7c855b711f41fca758933cd9c10c53540ef7ee203b2ce78b79b
                              • Opcode Fuzzy Hash: 0eb6640033c1bc6e418e6883088b9ca51dd4af1eef2beec65d816da93f2b06b1
                              • Instruction Fuzzy Hash: 75216F31B00629AFCF50EF64DC86EAE77BBAF44700F504459F855A7281DB30EA45CB69
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 006A7772
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 006A7787
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 006A7794
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 2eac809a4bb4e9711ec457c540ba9ade390ba623a6cff79bffa2290061df9a2a
                              • Instruction ID: e1a2a421de62b1ed98a20cbb2e2d54dd83e45f7534526b0de38fca24311816ab
                              • Opcode Fuzzy Hash: 2eac809a4bb4e9711ec457c540ba9ade390ba623a6cff79bffa2290061df9a2a
                              • Instruction Fuzzy Hash: C8112732204208BAEF106F60CC01FD7376AEF8AB54F010118F64196190C271E811CF20
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00624AD0), ref: 00624B45
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00624B57
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: 507309feb58cc85d65f1614859f6098a098d94e013c9649f78789e26ace82255
                              • Instruction ID: 047b6d1b590b73b647635d3e50bb0fc6ea27317dc929e13a1a0a9394e0245299
                              • Opcode Fuzzy Hash: 507309feb58cc85d65f1614859f6098a098d94e013c9649f78789e26ace82255
                              • Instruction Fuzzy Hash: EBD01234A10723CFD720AFB1E858B4676E6AF06351B118839D486D6250DA70EC80CE65
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00624B83,?), ref: 00624C44
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: fbd1a57fa81e45ea50eab36ba99d0203b6f72f6e1daead63f9cfadd56868c2f5
                              • Instruction ID: b67f423497baa22614ab6341aa11c53319ea4d6ac756e9c71429a4c6a8d62fe0
                              • Opcode Fuzzy Hash: fbd1a57fa81e45ea50eab36ba99d0203b6f72f6e1daead63f9cfadd56868c2f5
                              • Instruction Fuzzy Hash: 63D01230610B23CFD7206F75E94864676E6AF06351B11883AD496D6660EA70D880CE61
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00624BD0,?,00624DEF,?,006E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00624C11
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00624C23
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: c578d1042b4b531d5317f2085edc9d2f4a84117ffd69e764d4a63e9f47f3c86a
                              • Instruction ID: 20afe82517c89e8a5c539c8ec0e7f75461a86213d4150b17c9d65287c5b469e2
                              • Opcode Fuzzy Hash: c578d1042b4b531d5317f2085edc9d2f4a84117ffd69e764d4a63e9f47f3c86a
                              • Instruction Fuzzy Hash: D9D01230611B23CFD720BFB5ED48646B6E7EF0A352B119C3AD486D6650EEB0D880CE61
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,006A1039), ref: 006A0DF5
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 006A0E07
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 792533915ee5311a309a71c713454e366eff0c75d678997ff467a545a6c5fecf
                              • Instruction ID: 98383bbe290750b49767fd91d811d0eb7d8baf20ca03239dd4ac6f1a9b357e75
                              • Opcode Fuzzy Hash: 792533915ee5311a309a71c713454e366eff0c75d678997ff467a545a6c5fecf
                              • Instruction Fuzzy Hash: F7D01770950722CFE720AFB5D84868676E7AF16352F129C7ED486D2250EAB0EC90CE61
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00698CF4,?,006AF910), ref: 006990EE
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00699100
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: 12bc7cfc3f9c9e6f3cfe1b3270adc6284f06067bed3032f5d95adfd3fb5c11bc
                              • Instruction ID: e7cf0267b57393a2e8caf69cd5f05e377841f7430e2ec7d649ae49b24d14a3d1
                              • Opcode Fuzzy Hash: 12bc7cfc3f9c9e6f3cfe1b3270adc6284f06067bed3032f5d95adfd3fb5c11bc
                              • Instruction Fuzzy Hash: 54D01234510713CFDB20AF75D85C54676EAAF06352B168C3ED485D6650EA70D880CA61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: a04314f896a0901e37b651dd030a3844e35b3760217a8f6cc79364d67d74caec
                              • Instruction ID: 373b35b92f49a2121a7d2741e1535d88c3eaf735591cdaae98a77c726f2dcecf
                              • Opcode Fuzzy Hash: a04314f896a0901e37b651dd030a3844e35b3760217a8f6cc79364d67d74caec
                              • Instruction Fuzzy Hash: 51D01771804129FACB409B909C888F97B7EAB0A311F180463B406E6140E226AB96EA21
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ddc295d04edc00465aad524984119eca507cecd738de7c2aa9c8277b3c5e1d1
                              • Instruction ID: 682c01a82262511dd64945d19422f15ec3213eb67a3c3935bef16d35ce9c4106
                              • Opcode Fuzzy Hash: 7ddc295d04edc00465aad524984119eca507cecd738de7c2aa9c8277b3c5e1d1
                              • Instruction Fuzzy Hash: 7EC12C75A04216EFCB14CFA4C884AAEBBF6FF48714B158598E819EB351D730ED81DB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 0069E0BE
                              • CharLowerBuffW.USER32(?,?), ref: 0069E101
                                • Part of subcall function 0069D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0069D7C5
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0069E301
                              • _memmove.LIBCMT ref: 0069E314
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: 0095d4f7852bd2d08c92f4230f8c1a340bc018a9dbbc271e116fc270ec337239
                              • Instruction ID: 5083c16d9e08e94d2ca1226e4f16072f46472dfde4a43dc015a6cd44c2e45615
                              • Opcode Fuzzy Hash: 0095d4f7852bd2d08c92f4230f8c1a340bc018a9dbbc271e116fc270ec337239
                              • Instruction Fuzzy Hash: E5C15871A043119FCB44DF28C48096ABBEAFF89714F04896EF8999B351D731E946CF82
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 006980C3
                              • CoUninitialize.COMBASE ref: 006980CE
                                • Part of subcall function 0067D56C: CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 0067D5D4
                              • VariantInit.OLEAUT32(?), ref: 006980D9
                              • VariantClear.OLEAUT32(?), ref: 006983AA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 977f3e1e9a72dcb9f1703221d7a1356d3cafead8ab33a1941d8b6b7f51ad9c22
                              • Instruction ID: 3441e16735bd7872aa553dd2ae86c51a5d0bc3e73b184289c3160487d464f9f7
                              • Opcode Fuzzy Hash: 977f3e1e9a72dcb9f1703221d7a1356d3cafead8ab33a1941d8b6b7f51ad9c22
                              • Instruction Fuzzy Hash: 9DA16A35604B119FCB40DF64C481A6AB7EABF8A714F08481CF9959B7A1CB34ED05CF9A
                              APIs
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 006776EA
                              • CoTaskMemFree.COMBASE(00000000), ref: 00677702
                              • CLSIDFromProgID.COMBASE(?,?), ref: 00677727
                              • _memcmp.LIBCMT ref: 00677748
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: 9792efb3f5d6aed68e6b2b6b9e9531a1ba38ef3b2225f5d5d1f82eb32cee9640
                              • Instruction ID: 77b6f678a41412e5069f7387241c12f1e9d1f2ca74b11b83b190f8e9295d3815
                              • Opcode Fuzzy Hash: 9792efb3f5d6aed68e6b2b6b9e9531a1ba38ef3b2225f5d5d1f82eb32cee9640
                              • Instruction Fuzzy Hash: 7C81FD75A00119EFCB04DFA4C984DEEB7BAFF89315F208558E505AB250DB71AE46CB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: 4d973d36096201f1e9afe9578a287feeb68b8a23f9b9d9db5b2033f97befd8ca
                              • Instruction ID: f70d21c358cc7c84c69a31c485ae9a40119c0a334c430e46e5beaea0e89c0b6d
                              • Opcode Fuzzy Hash: 4d973d36096201f1e9afe9578a287feeb68b8a23f9b9d9db5b2033f97befd8ca
                              • Instruction Fuzzy Hash: 4351D374700B029EDF64AF65D891A6AB3E7AF45310F20D81FF59EDB292DA30D8818B15
                              APIs
                              • GetWindowRect.USER32(0151DDD0,?), ref: 006A9863
                              • ScreenToClient.USER32(00000002,00000002), ref: 006A9896
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 006A9903
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: 0934f0658f8312e95f80afb58c93ba1b8939e49e777cef82ca7248360c566227
                              • Instruction ID: 03cce2c308208f1af3de857590a48ff7235d557131f5df561f3dd9554aa9bb9e
                              • Opcode Fuzzy Hash: 0934f0658f8312e95f80afb58c93ba1b8939e49e777cef82ca7248360c566227
                              • Instruction Fuzzy Hash: 80512C34A00209AFCB14EF54D884AEE7BB6FF56360F248559F9559B3A0D731AD41CFA0
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00679AD2
                              • __itow.LIBCMT ref: 00679B03
                                • Part of subcall function 00679D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00679DBE
                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00679B6C
                              • __itow.LIBCMT ref: 00679BC3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID:
                              • API String ID: 3379773720-0
                              • Opcode ID: 577692fb85cd5364456bf64055fbe7186b302f9a7c9a4feae4e7ba049358f4f6
                              • Instruction ID: 0682836443c0eafac43c0ed5168dfcf7eb60b1b1c0454cbf09c63e1550f86b33
                              • Opcode Fuzzy Hash: 577692fb85cd5364456bf64055fbe7186b302f9a7c9a4feae4e7ba049358f4f6
                              • Instruction Fuzzy Hash: 6A41B170A00619ABDF21EF64D846FEE7BFBEF45710F004069F909A7291DB709A44CBA5
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0068B89E
                              • GetLastError.KERNEL32(?,00000000), ref: 0068B8C4
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0068B8E9
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0068B915
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: ad2183a43cac411d323184fdacb4debbe848053749496a1cc851ecbff883bba1
                              • Instruction ID: 4e765dc531a71be35377c1cc5480c6e2a7f90fdda74ee22ccd0f46addeb7421b
                              • Opcode Fuzzy Hash: ad2183a43cac411d323184fdacb4debbe848053749496a1cc851ecbff883bba1
                              • Instruction Fuzzy Hash: 4D412D35600910DFCB50EF65D444A99BBE2EF8A310F098498EC4A9B362CB34FD01CFA9
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006A88DE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 3861b3335f9c0c4497fbe083c27681db2f8fd110738496e00aeb5478c3e8966b
                              • Instruction ID: 68a218f371960edf6bafb84044097db87e64f26e64cc21125970b338b84ca1e5
                              • Opcode Fuzzy Hash: 3861b3335f9c0c4497fbe083c27681db2f8fd110738496e00aeb5478c3e8966b
                              • Instruction Fuzzy Hash: 7D319034600208AEEB24BB58CC85BFA77B7EB07310F544116FA55E72A1CE74ED409F96
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 006AAB60
                              • GetWindowRect.USER32(?,?), ref: 006AABD6
                              • PtInRect.USER32(?,?,006AC014), ref: 006AABE6
                              • MessageBeep.USER32(00000000), ref: 006AAC57
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: d12d4d935887e0be3a3ac2b96737500323b3e1fb63334417608f9ef4abba60da
                              • Instruction ID: 06c5b9f578a884a86ec1d661e11d589cf88c296ee9097b4e421cfa4b5c543d13
                              • Opcode Fuzzy Hash: d12d4d935887e0be3a3ac2b96737500323b3e1fb63334417608f9ef4abba60da
                              • Instruction Fuzzy Hash: 6B415F34600219DFDB11EF98D884AA97BF7FB4A320F1490AAE4169F361D730AC45CF92
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00680B27
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00680B43
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00680BA9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00680BFB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: d35ef69e6d9b873211720b2d399e57e51e95bc0ed4139fd0f01043d5ea0837eb
                              • Instruction ID: 53d63238492da3ac7946ceca809c56bcdb9f0ef89459315bf9a7c78515f41d5f
                              • Opcode Fuzzy Hash: d35ef69e6d9b873211720b2d399e57e51e95bc0ed4139fd0f01043d5ea0837eb
                              • Instruction Fuzzy Hash: B7318C70D40208AFFF70AF65CC05BFABBABAF55314F044B5AF480522D1C37699499756
                              APIs
                              • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 00680C66
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00680C82
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00680CE1
                              • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 00680D33
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 82280112bbcd50b9b61a3cdfc4e0c505c7f54c82ddb0a02b42ab5f679a62c1ae
                              • Instruction ID: a0caa6c22361352f9e0b63239f835f4a2ec1a2dce2bbc16acc08983b5faebd58
                              • Opcode Fuzzy Hash: 82280112bbcd50b9b61a3cdfc4e0c505c7f54c82ddb0a02b42ab5f679a62c1ae
                              • Instruction Fuzzy Hash: 00316930940208AEFFB0AFA5CC15BFEBB67AF4A310F048B1EE484522D1C3399D498752
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006561FB
                              • __isleadbyte_l.LIBCMT ref: 00656229
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00656257
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0065628D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 6edc964e466c910d8d1b9044cf05153d535ee5a26264b3c5a9b3f026a8c5b04a
                              • Instruction ID: e45c2b4f52099493b59865676415e3510a50ea55e614ea90297448862b5d53b5
                              • Opcode Fuzzy Hash: 6edc964e466c910d8d1b9044cf05153d535ee5a26264b3c5a9b3f026a8c5b04a
                              • Instruction Fuzzy Hash: 7931CE30604246AFDF218F65CC44BBA7BAAFF42312F554128FC64872A1DB31EE54DB90
                              APIs
                              • GetForegroundWindow.USER32 ref: 006A4F02
                                • Part of subcall function 00683641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0068365B
                                • Part of subcall function 00683641: GetCurrentThreadId.KERNEL32 ref: 00683662
                                • Part of subcall function 00683641: AttachThreadInput.USER32(00000000,?,00685005), ref: 00683669
                              • GetCaretPos.USER32(?), ref: 006A4F13
                              • ClientToScreen.USER32(00000000,?), ref: 006A4F4E
                              • GetForegroundWindow.USER32 ref: 006A4F54
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: da2f0a1dd55d94eafd5f7fd0a8ae152f365a47b4a557e7abde0318a1498ad2f4
                              • Instruction ID: ed48f9ff0b2b8df4b5871c265bbcc13d40d1cdbdcf005ba84757f01c3df2bccf
                              • Opcode Fuzzy Hash: da2f0a1dd55d94eafd5f7fd0a8ae152f365a47b4a557e7abde0318a1498ad2f4
                              • Instruction Fuzzy Hash: 68314D71D00118AFCB40EFA5DC819EFB7FAEF89300F10446AE415E7241EA75AE058FA5
                              APIs
                                • Part of subcall function 0067810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00678121
                                • Part of subcall function 0067810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0067812B
                                • Part of subcall function 0067810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0067813A
                                • Part of subcall function 0067810A: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00678141
                                • Part of subcall function 0067810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00678157
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006786A3
                              • _memcmp.LIBCMT ref: 006786C6
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006786FC
                              • HeapFree.KERNEL32(00000000), ref: 00678703
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 2182266621-0
                              • Opcode ID: f89efd2e262125ba58783d1a00be4b49e5f661e33226cb3530f0638af3012a4a
                              • Instruction ID: 50b620f2522e5dfaf5256ceb19e0cfdc3fbd55548ef2622067217efa67aa4d02
                              • Opcode Fuzzy Hash: f89efd2e262125ba58783d1a00be4b49e5f661e33226cb3530f0638af3012a4a
                              • Instruction Fuzzy Hash: C7217A71E80109EFDB10DFA4C949BEEB7BAEF55304F158099E448AB240DB31AE05CFA0
                              APIs
                              • __setmode.LIBCMT ref: 006409AE
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00687896,?,?,00000000), ref: 00625A2C
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00687896,?,?,00000000,?,?), ref: 00625A50
                              • _fprintf.LIBCMT ref: 006409E5
                              • OutputDebugStringW.KERNEL32(?), ref: 00675DBB
                                • Part of subcall function 00644AAA: _flsall.LIBCMT ref: 00644AC3
                              • __setmode.LIBCMT ref: 00640A1A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: f77a18d38c2b9e6471d119e7643f2405d2bf06b59b09d0b9c72851ec4c28e3b1
                              • Instruction ID: 8962f45e93e11870e659f1f58ef78b3600d2fe989fa464ef7e5b206ddec72adf
                              • Opcode Fuzzy Hash: f77a18d38c2b9e6471d119e7643f2405d2bf06b59b09d0b9c72851ec4c28e3b1
                              • Instruction Fuzzy Hash: 6E1127319046146FDB44B7B4AC87AFE7B6B9F42320F64415DF20557282EE70598247AD
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006917A3
                                • Part of subcall function 0069182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0069184C
                                • Part of subcall function 0069182D: InternetCloseHandle.WININET(00000000), ref: 006918E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: a2e8b67f0ac1252791dd254a04fe36224603c993fe1627e133e63c66c56381e3
                              • Instruction ID: 8f2fa58772ff193cea65bd548ee75c02c6f7e332e33fcdd58d204f2c1e3804ee
                              • Opcode Fuzzy Hash: a2e8b67f0ac1252791dd254a04fe36224603c993fe1627e133e63c66c56381e3
                              • Instruction Fuzzy Hash: CF218331200606BFDF125FA0DC41BBAB7EFFB4A710F204429F9119AA50D771D811ABA5
                              APIs
                              • GetFileAttributesW.KERNEL32(?,006AFAC0), ref: 00683A64
                              • GetLastError.KERNEL32 ref: 00683A73
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00683A82
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,006AFAC0), ref: 00683ADF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: 6b35daeb61b36aa2b26b56917f65f9b637e178480c9a35c0888fa0f6ec085046
                              • Instruction ID: f4d2be889d877a3499321352a44255d5e0aef7d155aaa71d013ba37d233dc696
                              • Opcode Fuzzy Hash: 6b35daeb61b36aa2b26b56917f65f9b637e178480c9a35c0888fa0f6ec085046
                              • Instruction Fuzzy Hash: 7721B1745082118F8314FF68D8818AA77E6AF16764F104A2DF499C73A1D7319E46CF82
                              APIs
                              • _free.LIBCMT ref: 00655101
                                • Part of subcall function 0064571C: __FF_MSGBANNER.LIBCMT ref: 00645733
                                • Part of subcall function 0064571C: __NMSG_WRITE.LIBCMT ref: 0064573A
                                • Part of subcall function 0064571C: RtlAllocateHeap.NTDLL(01500000,00000000,00000001), ref: 0064575F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: 63e78b1bf21ede77dc6bcc770e5314ac1910b947ff7cb605f5e009d22536aaca
                              • Instruction ID: 0dda64bc94044ac03fe9561dbb55e9eaa08e9029b385832ba7ed3c07b8b748d3
                              • Opcode Fuzzy Hash: 63e78b1bf21ede77dc6bcc770e5314ac1910b947ff7cb605f5e009d22536aaca
                              • Instruction Fuzzy Hash: 2511BF72900E11AFCF313FB0A86D79D3B9B9B013A2F10052EFD469A251DE3489459A98
                              APIs
                              • _memset.LIBCMT ref: 006244CF
                                • Part of subcall function 0062407C: _memset.LIBCMT ref: 006240FC
                                • Part of subcall function 0062407C: _wcscpy.LIBCMT ref: 00624150
                                • Part of subcall function 0062407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00624160
                              • KillTimer.USER32(?,00000001,?,?), ref: 00624524
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00624533
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0065D4B9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: 098925b072779167b87f18c867cea1b63e5f3316034560c6b9d4af5597091e5e
                              • Instruction ID: 0c02a31c60d1a05484944b3e748c8f2a8056c8ab1aaeac2e81ce55bb60ecbcf9
                              • Opcode Fuzzy Hash: 098925b072779167b87f18c867cea1b63e5f3316034560c6b9d4af5597091e5e
                              • Instruction Fuzzy Hash: C9210770904794AFE732DB249855BE6BBEE9F05309F04009DE7CE5A282C7746A89CB52
                              APIs
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00687896,?,?,00000000), ref: 00625A2C
                                • Part of subcall function 00625A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00687896,?,?,00000000,?,?), ref: 00625A50
                              • gethostbyname.WS2_32(?), ref: 00696399
                              • WSAGetLastError.WS2_32(00000000), ref: 006963A4
                              • _memmove.LIBCMT ref: 006963D1
                              • inet_ntoa.WS2_32(?), ref: 006963DC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: 866da89dcfb1be5b70d2fdf2edd987e8422727b7bc42a3c22c32108668e7a122
                              • Instruction ID: c446d560d129af2cb4a7128e7aa4775f5702fe8cca614dc8bdba539a4f7af252
                              • Opcode Fuzzy Hash: 866da89dcfb1be5b70d2fdf2edd987e8422727b7bc42a3c22c32108668e7a122
                              • Instruction Fuzzy Hash: 49116032900519AFCF40FFA4ED46CEEB7BAAF55310B144069F506A7261DB30AE14DF65
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006785E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 006785E9
                              • CloseHandle.KERNEL32(00000004), ref: 00678603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00678632
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 2621361867-0
                              • Opcode ID: ad13f4b5564dd95544b3607cbee1004d8cc8be6de87fbb14238492b6f5574a7c
                              • Instruction ID: 34f02ae6338b8e86e4841a6bcdb96ec06a2ee01ceb7105e4f09f8ff8945f3f7d
                              • Opcode Fuzzy Hash: ad13f4b5564dd95544b3607cbee1004d8cc8be6de87fbb14238492b6f5574a7c
                              • Instruction Fuzzy Hash: 44117972500109BFDF019FE4EC48AEE7BAAEF09304F044168FE08A2160C7729E20EB21
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00678B61
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00678B73
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00678B89
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00678BA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 4ab21975033981825207686894a728092c408b234f743c87b844e45771c01233
                              • Instruction ID: baa69d049a976ecc9b3e8033d7ee299c9efefa8a9d9a15aaee5da3cd6410f86e
                              • Opcode Fuzzy Hash: 4ab21975033981825207686894a728092c408b234f743c87b844e45771c01233
                              • Instruction Fuzzy Hash: A3115A79940218FFEB10DFA5CC84FADBBB9FB48710F2040A5EA04B7290DA716E11DB94
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0067D84D
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0067D864
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0067D879
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0067D897
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: 63048bbe5636159b62130655efa8ffec98ec48f40586688bbabb4d9c74bc1652
                              • Instruction ID: 332c1e124d0a7533c0004f2b3261882a6666b8aa6be7aaf79b4b2e60c1b9a01e
                              • Opcode Fuzzy Hash: 63048bbe5636159b62130655efa8ffec98ec48f40586688bbabb4d9c74bc1652
                              • Instruction Fuzzy Hash: A9116175605304DBE3209F90DC08F93BBFDEF04B00F108A69E55AD6591D7B0E9499FA2
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: a6c3eda0256bf3146134be21775d41fe872b6c88d081678ecb2ea756317449fd
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: 0F014CB244814ABBCF165F84EC01CEE3FA7BB18356F588415FE1859171D236C9BAAB81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 006AB2E4
                              • ScreenToClient.USER32(?,?), ref: 006AB2FC
                              • ScreenToClient.USER32(?,?), ref: 006AB320
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 006AB33B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 377ae6a9cd6164012e9225653ef7b8da3f302aea6ca82c2d5c2d033628dcdce8
                              • Instruction ID: 845ddb95cd4460d8378406476ea3ca15f891c76e7c09beb16ddcf5a970fd4315
                              • Opcode Fuzzy Hash: 377ae6a9cd6164012e9225653ef7b8da3f302aea6ca82c2d5c2d033628dcdce8
                              • Instruction Fuzzy Hash: C31174B9D00209EFDB01DFA9C8849EEBBF9FF09310F109166E914E3220D731AA518F91
                              APIs
                              • _memset.LIBCMT ref: 006AB644
                              • _memset.LIBCMT ref: 006AB653
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006E6F20,006E6F64), ref: 006AB682
                              • CloseHandle.KERNEL32 ref: 006AB694
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: ae7a0aa3b6285606dc78c93c109b765990da514d75442d025db3de4213f1092a
                              • Instruction ID: 837f2ee9467244b0c51adc4bdae626ddead7332086a097b823e611c7ba7a4510
                              • Opcode Fuzzy Hash: ae7a0aa3b6285606dc78c93c109b765990da514d75442d025db3de4213f1092a
                              • Instruction Fuzzy Hash: E1F05EB25403807AE7102B61FC46FBB7A9FEB193D5F006020FA08EA192D7715C008BA9
                              APIs
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00686BE6
                                • Part of subcall function 006876C4: _memset.LIBCMT ref: 006876F9
                              • _memmove.LIBCMT ref: 00686C09
                              • _memset.LIBCMT ref: 00686C16
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00686C26
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: c819c113b42cc70edcaaf19db8b082975d87e00dd572edd5d46c59c3430b20a0
                              • Instruction ID: c01fe36a872810f27267b955c66fd42ebeabfa13122e75b09011b2c7dbba6cc6
                              • Opcode Fuzzy Hash: c819c113b42cc70edcaaf19db8b082975d87e00dd572edd5d46c59c3430b20a0
                              • Instruction Fuzzy Hash: F7F05E3A200100BBCF817F95DC85A8ABB2AEF46321F148065FE085F227D731E911CBB9
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00622231
                              • SetTextColor.GDI32(?,000000FF), ref: 0062223B
                              • SetBkMode.GDI32(?,00000001), ref: 00622250
                              • GetStockObject.GDI32(00000005), ref: 00622258
                              • GetWindowDC.USER32(?,00000000), ref: 0065BE83
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0065BE90
                              • GetPixel.GDI32(00000000,?,00000000), ref: 0065BEA9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 0065BEC2
                              • GetPixel.GDI32(00000000,?,?), ref: 0065BEE2
                              • ReleaseDC.USER32(?,00000000), ref: 0065BEED
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: 57d56ccf8b635fc475592319963df03fe56a9380ee7118cdcd08b482916526f7
                              • Instruction ID: 5b747245a88cdf5a0e9c4acc820eda86446a809ec15218d845a516aab4629b21
                              • Opcode Fuzzy Hash: 57d56ccf8b635fc475592319963df03fe56a9380ee7118cdcd08b482916526f7
                              • Instruction Fuzzy Hash: 1DE03932504244EADB216FA4FC0D7D83B12EB16332F1493A6FA69480E187724984DF22
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 0067871B
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,006782E6), ref: 00678722
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006782E6), ref: 0067872F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,006782E6), ref: 00678736
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: 599a1aa206e2877b6037641aae3f964d641e13cb3709255089491b179a54bb0c
                              • Instruction ID: b9d9abffb9cc80d01388495062ed2094af2626be0993820b09fdb1e80502760b
                              • Opcode Fuzzy Hash: 599a1aa206e2877b6037641aae3f964d641e13cb3709255089491b179a54bb0c
                              • Instruction Fuzzy Hash: C0E086366512119FD7606FF05D0CF9B7BAEEF52791F148828B24ACA040DA349841CF51
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID:
                              • String ID: %k
                              • API String ID: 0-3601005739
                              • Opcode ID: a4e3372d93f6cd9ad702260c8b3581d30ac0fe68aab0608bf2e45fdc4f9c8936
                              • Instruction ID: 48c99a68fb9b9f44d2e198e3d1c38fd6894c4ec3f31ac0fdc2751b5f67c5ecb8
                              • Opcode Fuzzy Hash: a4e3372d93f6cd9ad702260c8b3581d30ac0fe68aab0608bf2e45fdc4f9c8936
                              • Instruction Fuzzy Hash: 4FB1A371800929DACF24EF94E8819FDB7B7EF44310F10812AF942A7291DB309E86CF95
                              APIs
                                • Part of subcall function 0063FC86: _wcscpy.LIBCMT ref: 0063FCA9
                                • Part of subcall function 00629837: __itow.LIBCMT ref: 00629862
                                • Part of subcall function 00629837: __swprintf.LIBCMT ref: 006298AC
                              • __wcsnicmp.LIBCMT ref: 0068B02D
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0068B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 7305201869c9a7ff69f898e9a66bed2b12d2b4ccbd42ff61d620f5470d98987a
                              • Instruction ID: f6388e122f2b589770988acb413aa98ccf1d34edbcba81f855536be0744f5309
                              • Opcode Fuzzy Hash: 7305201869c9a7ff69f898e9a66bed2b12d2b4ccbd42ff61d620f5470d98987a
                              • Instruction Fuzzy Hash: F361B171A00218AFCB14EF94C895EEEB7B6EF09310F004169F956AB391D770AE40CB94
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00632968
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00632981
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: d84a9ea19e5ef4c967144a8fc9fbcb83e61458c393a0d826e779081074577a55
                              • Instruction ID: dde2ff8374fb69fc416a5317158e5a2704bf1fec27c4ce8c194d0d15dd49661b
                              • Opcode Fuzzy Hash: d84a9ea19e5ef4c967144a8fc9fbcb83e61458c393a0d826e779081074577a55
                              • Instruction Fuzzy Hash: 47513771419B549BD360EF10EC86BABBBE9FF85354F42885DF2D8410A1DF308529CB6A
                              APIs
                                • Part of subcall function 00624F0B: __fread_nolock.LIBCMT ref: 00624F29
                              • _wcscmp.LIBCMT ref: 00689824
                              • _wcscmp.LIBCMT ref: 00689837
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: 61c3b449ec9e9e2eafcc0f802ecf3c7b9ce5c249142ba87d7ce1f7277327d292
                              • Instruction ID: 960a7df8d0c9d0c2a80d7e65c854aa4396cefedac4d35b9794db07fe4f1103ef
                              • Opcode Fuzzy Hash: 61c3b449ec9e9e2eafcc0f802ecf3c7b9ce5c249142ba87d7ce1f7277327d292
                              • Instruction Fuzzy Hash: 9641C671A0021ABADF20AEA0DC45FEFBBBEDF85710F010569F904B7281DA719A058B65
                              APIs
                              • _memset.LIBCMT ref: 0069259E
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 006925D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 3848166f131fb00e841a1097599100b69284f6c29997c2aee890e55a201e4dbf
                              • Instruction ID: 842227290ab8c815a59f750e515dc45ea471a98bc2caf796e645ddf8e3c55e3d
                              • Opcode Fuzzy Hash: 3848166f131fb00e841a1097599100b69284f6c29997c2aee890e55a201e4dbf
                              • Instruction Fuzzy Hash: A631087180011AABCF51EFA1DC95EEEBFBAFF08310F100059F915A6262EB315956DF64
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 006A7B61
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006A7B76
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: 79f05d84e6926159c52512b144c503c8d8fffd1357e3afa6cf996b561ba1f8a6
                              • Instruction ID: 11403f5d190c1671daf87278c93a9ee66ade9b5845ee7f71038157f486f6b933
                              • Opcode Fuzzy Hash: 79f05d84e6926159c52512b144c503c8d8fffd1357e3afa6cf996b561ba1f8a6
                              • Instruction Fuzzy Hash: 4D410774A0530AAFDB14DF64C981BEABBB6FB09300F10016AEA05AB351D771AD51CFA0
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 006A6B17
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 006A6B53
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 826fa40ada8514dea1e24eba98cf1c9359b2e3756e5dbeddd315c35fb29680bb
                              • Instruction ID: 958a1413d8c28a273edbb630f7493d1806a6101514c372ebfdc7144b5e416058
                              • Opcode Fuzzy Hash: 826fa40ada8514dea1e24eba98cf1c9359b2e3756e5dbeddd315c35fb29680bb
                              • Instruction Fuzzy Hash: 39319071100604AEDB10AF64DC80BFB73AAFF49760F14961DF9A5D7190DA31AC91CB74
                              APIs
                              • _memset.LIBCMT ref: 00682911
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0068294C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 6b0002d6dc33c7e5c29b064151371cd59a7c0d5587ce516c8d56835dd839acf4
                              • Instruction ID: 8bf09254cb6e08762f3f9cfc660b6718a86d58f1b83ea4740da5c281c79fec13
                              • Opcode Fuzzy Hash: 6b0002d6dc33c7e5c29b064151371cd59a7c0d5587ce516c8d56835dd839acf4
                              • Instruction Fuzzy Hash: 7431D531A00307AFEF24EF5AC995BEEBBF6EF45350F140229E985A62A0D7709944CB51
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 006A6761
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006A676C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 038ca9327621da2009b5890a058716f6c5068481ff86d61d265ca46acb2567ca
                              • Instruction ID: f9fc4f96ca8793f3bcdcd513b5112de77a237672c0671829458be8d06e64948f
                              • Opcode Fuzzy Hash: 038ca9327621da2009b5890a058716f6c5068481ff86d61d265ca46acb2567ca
                              • Instruction Fuzzy Hash: 6111B275210208AFEF11AF64CC80EFB376BEB4A368F150129F9149B3A0D671DC918BA0
                              APIs
                                • Part of subcall function 00621D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00621D73
                                • Part of subcall function 00621D35: GetStockObject.GDI32(00000011), ref: 00621D87
                                • Part of subcall function 00621D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00621D91
                              • GetWindowRect.USER32(00000000,?), ref: 006A6C71
                              • GetSysColor.USER32(00000012), ref: 006A6C8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: caa1638e0bb22a90687f5930b64b327c03766adfebee613a402feb9d1b187d72
                              • Instruction ID: 7c22c17c1cf15139396458bed4d3b5eaec791c5f7d12118f0bd36e06b0ad6f1a
                              • Opcode Fuzzy Hash: caa1638e0bb22a90687f5930b64b327c03766adfebee613a402feb9d1b187d72
                              • Instruction Fuzzy Hash: AC215972510219AFDF04EFB8CC45AFA7BAAFB09314F045628F996D2250D635E851DF60
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 006A69A2
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006A69B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 7f5227244ec2626a58b5a5d5fd9c27f5332308b60516fe3e285f9c5653b7458d
                              • Instruction ID: c6821b60f26cf45f58855058c1b7fedd0cf22557d580b5bdf6e46da95f87c0a7
                              • Opcode Fuzzy Hash: 7f5227244ec2626a58b5a5d5fd9c27f5332308b60516fe3e285f9c5653b7458d
                              • Instruction Fuzzy Hash: BE116D71500205ABEB10AF64DC44AEB376BEB16374F544728F9A5962E0C771EC519F60
                              APIs
                              • _memset.LIBCMT ref: 00682A22
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00682A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 5f92f8fa45e51d338b3863f2206df91a6f3b0b0019fe2e8cb582feff3344dcde
                              • Instruction ID: de77e7888ccb46a6fad09d0570386a4fa2569f99fa0f0eb84d70b7d2872eca67
                              • Opcode Fuzzy Hash: 5f92f8fa45e51d338b3863f2206df91a6f3b0b0019fe2e8cb582feff3344dcde
                              • Instruction Fuzzy Hash: 6E11D036901216ABCF38FB98D994BEA77ABAF45304F144225E855EB390D730AD0AC791
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0069222C
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00692255
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 35db7753824c1cf1b11e9795588d957ea1593f3ff6fbc738c26dc67a7ffa3174
                              • Instruction ID: 5687a97a25d14d774997a3d928c3f4105ba589b0a45c7f835b54e99180a261bb
                              • Opcode Fuzzy Hash: 35db7753824c1cf1b11e9795588d957ea1593f3ff6fbc738c26dc67a7ffa3174
                              • Instruction Fuzzy Hash: 0E110670541226BADF289F518CA4EF7FBAEFF06751F10822AF50486900D3706A91D6F0
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00678E73
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 9221bd0dc371bf2a74559d8fa1bae6896458e177d6f56d5d6a3d5505bde92dda
                              • Instruction ID: 8f9728340c9a852a7d1b33bd0f2ebe9b35fb423f3083deba1b1e140820d8b9bd
                              • Opcode Fuzzy Hash: 9221bd0dc371bf2a74559d8fa1bae6896458e177d6f56d5d6a3d5505bde92dda
                              • Instruction Fuzzy Hash: 2001B571A41629AB8B14EBA4CC55CFE736BAF46320B144A1EF826573E1EF315C08DA51
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00678D6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 019b25311f0f4c818a4a7840cde89522bb3c2b61a09d96b22333e8a375c95656
                              • Instruction ID: 6a4e44b3d52f0a58433b242787a21e27e571ee46e6b35e6819e048a36eaccd40
                              • Opcode Fuzzy Hash: 019b25311f0f4c818a4a7840cde89522bb3c2b61a09d96b22333e8a375c95656
                              • Instruction Fuzzy Hash: 5C01FC71B41518ABCB24E7E0C956EFE77AEDF15340F10401E7406632D1DE215E08D675
                              APIs
                                • Part of subcall function 00627DE1: _memmove.LIBCMT ref: 00627E22
                                • Part of subcall function 0067AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0067AABC
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00678DEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 449638650192496e73535e1f280db815484f4a32f0deeb1cdce9dff6164dce31
                              • Instruction ID: f21d3ba86c22f2d7bfde2b3b2eed5650eaa9649609b06403e85c49e3fc239f6f
                              • Opcode Fuzzy Hash: 449638650192496e73535e1f280db815484f4a32f0deeb1cdce9dff6164dce31
                              • Instruction Fuzzy Hash: 47012B71A81118BBCB25E7E4C946EFEB7AECF12300F10401AB80A632D1DE214E09DA76
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: __calloc_crt
                              • String ID: @Bn
                              • API String ID: 3494438863-3885905162
                              • Opcode ID: 2bac49a26824f49a21c591fb34df17cca9517ec1bbbc20738eabf70e735d4f8c
                              • Instruction ID: b5c26763a97d82a08d7420d8fc65d5e79d5ae1cf23342808aa4a55e7e1113240
                              • Opcode Fuzzy Hash: 2bac49a26824f49a21c591fb34df17cca9517ec1bbbc20738eabf70e735d4f8c
                              • Instruction Fuzzy Hash: AAF04F71608B128FF7649F68FC91BA62B97E712734B50041EF302CF290EB70899286C5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: 30a330b9efe1b6a00d4a29e77fad20ef33a5594af991a2327a0122c07f42562e
                              • Instruction ID: 4a24a3e69be510ebccd63815c01ef525dfdaa460831c765d1f7784cb8dbd6a18
                              • Opcode Fuzzy Hash: 30a330b9efe1b6a00d4a29e77fad20ef33a5594af991a2327a0122c07f42562e
                              • Instruction Fuzzy Hash: F9E06832A003382BD320AB99EC49FA7F7ACEB91B70F00012BFD00D3140D960AA058BE0
                              APIs
                                • Part of subcall function 0065B314: _memset.LIBCMT ref: 0065B321
                                • Part of subcall function 00640940: InitializeCriticalSectionAndSpinCount.KERNEL32(006E4158,00000000,006E4144,0065B2F0,?,?,?,0062100A), ref: 00640945
                              • IsDebuggerPresent.KERNEL32(?,?,?,0062100A), ref: 0065B2F4
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0062100A), ref: 0065B303
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0065B2FE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: 87ca38745cdbe298f1bcdd8fc7a2cf752774b73e58b68c5e87a829c37c36c346
                              • Instruction ID: 8242670fbfd2121511c68b342edf3942c3ccc49de3c9fae9b4de2d7dc223b49c
                              • Opcode Fuzzy Hash: 87ca38745cdbe298f1bcdd8fc7a2cf752774b73e58b68c5e87a829c37c36c346
                              • Instruction Fuzzy Hash: 0CE092702007118FE760EF68E4047427BE6EF04305F049A6CE856D7341E7B4E448CFA1
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?), ref: 00661775
                                • Part of subcall function 0069BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0066195E,?), ref: 0069BFFE
                                • Part of subcall function 0069BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0069C010
                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0066196D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: WIN_XPe
                              • API String ID: 582185067-3257408948
                              • Opcode ID: b486701f419c49a85f1d0485c621a17a65cfabaa1415a9d2e8cd60bce74f535a
                              • Instruction ID: 514ddf57a3d1b859f20ce38195d4ae392a22732c46e5cb512d54789a69a8df17
                              • Opcode Fuzzy Hash: b486701f419c49a85f1d0485c621a17a65cfabaa1415a9d2e8cd60bce74f535a
                              • Instruction Fuzzy Hash: 2FF0ED71800109DFDB15DB91D9C4AECBBFAFB19301F581096E102AB190D7716F85DF61
                              APIs
                              • __lock.LIBCMT ref: 00649B94
                                • Part of subcall function 00649C0B: __mtinitlocknum.LIBCMT ref: 00649C1D
                                • Part of subcall function 00649C0B: RtlEnterCriticalSection.NTDLL(00000000), ref: 00649C36
                              • __updatetlocinfoEx_nolock.LIBCMT ref: 00649BA4
                                • Part of subcall function 00649100: ___addlocaleref.LIBCMT ref: 0064911C
                                • Part of subcall function 00649100: ___removelocaleref.LIBCMT ref: 00649127
                                • Part of subcall function 00649100: ___freetlocinfo.LIBCMT ref: 0064913B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                              • String ID: 8m
                              • API String ID: 547918592-1963270409
                              • Opcode ID: d0f01708a01fd9f1ed2cb9b18a4695271466f3c783f8fa4a2dc2e6c4ff3aa2c1
                              • Instruction ID: 3ca659ab0a52c5837eeb4808696ba5e3bb0f32a0a9275284400da71453b6d68f
                              • Opcode Fuzzy Hash: d0f01708a01fd9f1ed2cb9b18a4695271466f3c783f8fa4a2dc2e6c4ff3aa2c1
                              • Instruction Fuzzy Hash: 44E08C71D87700ABEB90BBE86A43B4E27639B02B21F20115FF0555A2C1CD712400862F
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006A596E
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 006A5981
                                • Part of subcall function 00685244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006852BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 9daa920585744d24d97d8cd0382e286b116078a5b93e162ef4baf9ca61cb4f47
                              • Instruction ID: dd04382ea6aa279e961acd185fd9d5a93d9520e3a69a0c05f1dfde33c69f3b3d
                              • Opcode Fuzzy Hash: 9daa920585744d24d97d8cd0382e286b116078a5b93e162ef4baf9ca61cb4f47
                              • Instruction Fuzzy Hash: 28D0C935784311BAE7A4BBB0AC5FF966A56AB11B50F011829B24AAA1D0CDE0A800CA54
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006A59AE
                              • PostMessageW.USER32(00000000), ref: 006A59B5
                                • Part of subcall function 00685244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006852BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1278958782.0000000000621000.00000040.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                              • Associated: 00000001.00000002.1278932826.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.00000000006ED000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1278958782.000000000072E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279148960.0000000000734000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1279169006.0000000000735000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_620000_F0DgoRk0p1.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: ba39ba33d5cd76f0c32422de5fdef4cba51d841b84b478e482f55dd494c867eb
                              • Instruction ID: 070b916208ca517ad58bbd676b25c46f0e26fba5524808b15f95ee0ed24abb51
                              • Opcode Fuzzy Hash: ba39ba33d5cd76f0c32422de5fdef4cba51d841b84b478e482f55dd494c867eb
                              • Instruction Fuzzy Hash: 98D0C9317803117AE7A4BBB0AC4FF966656AB16B50F011829B246AA1D0CDE0A800CA59