Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hgTNnG8vjD.exe

Overview

General Information

Sample name:hgTNnG8vjD.exe
renamed because original name is a hash value
Original sample name:9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564.exe
Analysis ID:1589394
MD5:42569d9b139c0093fa393444dfbea52e
SHA1:0f661a3a1b6b9c728e8949d14db45af6e4f0d103
SHA256:9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564
Tags:exeuser-zhuzhu0009
Infos:

Detection

DarkComet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected DarkComet
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Sample uses process hollowing technique
Sigma detected: New RUN Key Pointing to Suspicious Folder
Uses dynamic DNS services
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables driver privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • hgTNnG8vjD.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\hgTNnG8vjD.exe" MD5: 42569D9B139C0093FA393444DFBEA52E)
    • RegSvcs.exe (PID: 7544 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" MD5: 3A77A4F220612FA55118FB8D7DDAE83C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkCometDarkComet is one of the most famous RATs, developed by Jean-Pierre Lesueur in 2008. After being used in the Syrian civil war in 2011, Lesuer decided to stop developing the trojan. Indeed, DarkComet is able to enable control over a compromised system through use of a simple graphic user interface. Experts think that this user friendliness is the key of its mass success.
  • APT33
  • Lazarus Group
  • Operation C-Major
https://malpedia.caad.fkie.fraunhofer.de/details/win.darkcomet
{"PWD": "Myhacker123", "MUTEX": "snake", "SID": "Snake-5", "FWB": "0", "NETDATA": ["kasavetia.no-ip.biz:12321", "kasavetia.no-ip.biz:45654", "eu3.no-ip.biz:45654", "eu3.no-ip.biz:12321"], "GENCODE": "Pi2UsWcM3BhH", "OFFLINEK": "1", "FTPUPLOADK": "1", "FTPHOST": "ftp.tirservicebg.com", "FTPUSER": "evil@tirservicebg.com", "FTPPASS": "262914", "FTPPORT": "21", "FTPSIZE": "1024", "FTPROOT": "/"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2631420209.0000000002DC1000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0xf58:$k2: #KCMDDC51#-890
00000002.00000002.2631420209.0000000002D6A000.00000004.00001000.00020000.00000000.sdmpDarkComet_2DarkCometJean-Philippe Teissier / @Jipe_
  • 0x518:$a: #BEGIN DARKCOMET DATA --
  • 0x858:$a: #BEGIN DARKCOMET DATA --
  • 0x687:$b: #EOF DARKCOMET DATA --
  • 0x9c7:$b: #EOF DARKCOMET DATA --
00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
        Click to see the 109 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          2.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_DarkCometRatYara detected DarkCometKevin Breen <kevin@techanarchy.net>
            2.2.RegSvcs.exe.400000.0.raw.unpackWindows_Trojan_Darkcomet_1df27bccunknownunknown
            • 0x839bc:$a1: BTRESULTHTTP Flood|Http Flood task finished!|
            • 0x7e32d:$a2: is now open!|
            • 0x7dc88:$a3: ActiveOnlineKeylogger
            • 0x7e38c:$a4: #BOT#RunPrompt
            • 0x7d434:$a5: GETMONITORS
            2.2.RegSvcs.exe.400000.0.raw.unpackRAT_DarkCometDetects DarkComet RATKevin Breen <kevin@techanarchy.net>
            • 0x7e4ac:$a1: #BOT#URLUpdate
            • 0x7e3c5:$a2: Command successfully executed!
            • 0x1408:$b1: FastMM Borland Edition
            • 0x2bf4c:$b2: %s, ClassID: %s
            • 0x72e28:$b3: I wasn't able to open the hosts file
            • 0x7e2b0:$b4: #BOT#VisitUrl
            • 0x6d1c0:$b5: #KCMDDC
            2.2.RegSvcs.exe.400000.0.raw.unpackDarkComet_1DarkComet RATbotherder https://github.com/botherder
            • 0x7e2c8:$bot1: #BOT#OpenUrl
            • 0x7e344:$bot2: #BOT#Ping
            • 0x7e38c:$bot3: #BOT#RunPrompt
            • 0x7e44c:$bot4: #BOT#SvrUninstall
            • 0x7e594:$bot5: #BOT#URLDownload
            • 0x7e4ac:$bot6: #BOT#URLUpdate
            • 0x7e2b0:$bot7: #BOT#VisitUrl
            • 0x7e3f0:$bot8: #BOT#CloseServer
            • 0x7e638:$ddos1: DDOSHTTPFLOOD
            • 0x7e650:$ddos2: DDOSSYNFLOOD
            • 0x7e668:$ddos3: DDOSUDPFLOOD
            • 0x7dc88:$keylogger1: ActiveOnlineKeylogger
            • 0x7dcaa:$keylogger1: ActiveOnlineKeylogger
            • 0x7dca8:$keylogger2: UnActiveOnlineKeylogger
            • 0x7dd04:$keylogger3: ActiveOfflineKeylogger
            • 0x7dd26:$keylogger3: ActiveOfflineKeylogger
            • 0x7dd24:$keylogger4: UnActiveOfflineKeylogger
            • 0x7e930:$shell1: ACTIVEREMOTESHELL
            • 0x7e95c:$shell2: SUBMREMOTESHELL
            • 0x7e974:$shell3: KILLREMOTESHELL
            Click to see the 12 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\my5\YffwNrk.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hgTNnG8vjD.exe, ProcessId: 7472, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\my5
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\my5\YffwNrk.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hgTNnG8vjD.exe, ProcessId: 7472, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\my5
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: hgTNnG8vjD.exeAvira: detected
            Source: 00000002.00000002.2631420209.0000000002D6A000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: DarkComet {"PWD": "Myhacker123", "MUTEX": "snake", "SID": "Snake-5", "FWB": "0", "NETDATA": ["kasavetia.no-ip.biz:12321", "kasavetia.no-ip.biz:45654", "eu3.no-ip.biz:45654", "eu3.no-ip.biz:12321"], "GENCODE": "Pi2UsWcM3BhH", "OFFLINEK": "1", "FTPUPLOADK": "1", "FTPHOST": "ftp.tirservicebg.com", "FTPUSER": "evil@tirservicebg.com", "FTPPASS": "262914", "FTPPORT": "21", "FTPSIZE": "1024", "FTPROOT": "/"}
            Source: hgTNnG8vjD.exeVirustotal: Detection: 45%Perma Link
            Source: hgTNnG8vjD.exeReversingLabs: Detection: 39%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
            Source: hgTNnG8vjD.exeJoe Sandbox ML: detected
            Source: hgTNnG8vjD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B

            Networking

            barindex
            Source: unknownDNS query: name: kasavetia.no-ip.biz
            Source: unknownDNS query: name: eu3.no-ip.biz
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
            Source: global trafficDNS traffic detected: DNS query: kasavetia.no-ip.biz
            Source: global trafficDNS traffic detected: DNS query: eu3.no-ip.biz

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2628646139.000000000049D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTR

            System Summary

            barindex
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 Author: unknown
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects DarkComet Author: ditekSHen
            Source: 00000002.00000002.2631420209.0000000002DC1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000002.00000002.2631420209.0000000002D6A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet Author: ditekSHen
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 Author: unknown
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc Author: unknown
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: Detects DarkComet RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet RAT Author: botherder https://github.com/botherder
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet Author: Jean-Philippe Teissier / @Jipe_
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_3 Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_4 Author: unknown
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTR
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004096A00_2_004096A0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0042200C0_2_0042200C
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0041A2170_2_0041A217
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004122160_2_00412216
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0042435D0_2_0042435D
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004033C00_2_004033C0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044F4300_2_0044F430
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004125E80_2_004125E8
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044663B0_2_0044663B
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004138010_2_00413801
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0042096F0_2_0042096F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004129D00_2_004129D0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004119E30_2_004119E3
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0041C9AE0_2_0041C9AE
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0047EA6F0_2_0047EA6F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040FA100_2_0040FA10
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044EB5F0_2_0044EB5F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00423C810_2_00423C81
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00411E780_2_00411E78
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00442E0C0_2_00442E0C
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00420EC00_2_00420EC0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044CF170_2_0044CF17
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00444FD20_2_00444FD2
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004023702_2_00402370
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004064C02_2_004064C0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0043E6442_2_0043E644
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004389B42_2_004389B4
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0045EC782_2_0045EC78
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0046ADBC2_2_0046ADBC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0046797C2_2_0046797C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00469B902_2_00469B90
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess token adjusted: Load DriverJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess token adjusted: SecurityJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: String function: 004115D7 appears 36 times
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: String function: 00416C70 appears 39 times
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: String function: 00445AE0 appears 65 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 00407B10 appears 139 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 004735E8 appears 39 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 00407B08 appears 33 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 004218E4 appears 86 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 00405584 appears 61 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 00405530 appears 71 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 004055C8 appears 36 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: String function: 00405864 appears 33 times
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000002.2629259538.0000000000975000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exe, 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exeBinary or memory string: OriginalFilenameMSRSAAP.EXEV vs hgTNnG8vjD.exe
            Source: hgTNnG8vjD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
            Source: 00000002.00000002.2631420209.0000000002DC1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
            Source: 00000002.00000002.2631420209.0000000002D6A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DarkComet author = ditekSHen, description = Detects DarkComet
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: Process Memory Space: hgTNnG8vjD.exe PID: 7472, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: Windows_Trojan_Darkcomet_1df27bcc reference_sample = 7fbe87545eef49da0df850719536bb30b196f7ad2d5a34ee795c01381ffda569, os = windows, severity = x86, creation_date = 2021-08-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Darkcomet, fingerprint = 63b77999860534b71b7b4e7b3da9df175ccd0009f4c13215a59c6b83e0e95b3b, id = 1df27bcc-9f18-48d4-bd7f-73bdc7cb1e63, last_modified = 2021-10-04
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: RAT_DarkComet date = 01.04.2014, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects DarkComet RAT, reference = http://malwareconfig.com/stats/DarkComet
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_1 author = botherder https://github.com/botherder, description = DarkComet RAT
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_2 date = 2013-01-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = DarkComet, version = 1.0
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_3 date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/DarkComet
            Source: Process Memory Space: RegSvcs.exe PID: 7544, type: MEMORYSTRMatched rule: DarkComet_4 reference = https://github.com/bwall/bamfdetect/blob/master/BAMF_Detect/modules/yara/darkcomet.yara
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@52/0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0048AEA8 AdjustTokenPrivileges,CloseHandle,2_2_0048AEA8
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\dclogsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\snake
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: hgTNnG8vjD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hgTNnG8vjD.exeVirustotal: Detection: 45%
            Source: hgTNnG8vjD.exeReversingLabs: Detection: 39%
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeFile read: C:\Users\user\Desktop\hgTNnG8vjD.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hgTNnG8vjD.exe "C:\Users\user\Desktop\hgTNnG8vjD.exe"
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: hgTNnG8vjD.exeStatic file information: File size 1779958 > 1048576
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: hgTNnG8vjD.exeStatic PE information: real checksum: 0xa961f should be: 0x1b8401
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004186D4 push ecx; mov dword ptr [esp], edx2_2_004186D9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0048F0AC push 0048F125h; ret 2_2_0048F11D
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0048F6D4 push 0048F761h; ret 2_2_0048F759
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00482058 push 004820C2h; ret 2_2_004820BA
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0045E078 push 0045E0DEh; ret 2_2_0045E0D6
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004220E0 push ecx; mov dword ptr [esp], ecx2_2_004220E1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004660F8 push 00466130h; ret 2_2_00466128
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0042E138 push 0042E170h; ret 2_2_0042E168
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004741C4 push 00474206h; ret 2_2_004741FE
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004041DC push eax; ret 2_2_00404218
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0046224C push 00462284h; ret 2_2_0046227C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00464228 push ecx; mov dword ptr [esp], edx2_2_00464229
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004482C4 push 0044832Eh; ret 2_2_00448326
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0041632A push 004163A2h; ret 2_2_0041639A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0041632C push 004163A2h; ret 2_2_0041639A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0048E3AC push 0048E3DCh; ret 2_2_0048E3D4
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0046E3A0 push 0046E3EDh; ret 2_2_0046E3E5
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004204E4 push ecx; mov dword ptr [esp], edx2_2_004204E9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004086CC push 0040870Eh; ret 2_2_00408706
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0044A74C push ecx; mov dword ptr [esp], edx2_2_0044A750
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_004107FC push 00410828h; ret 2_2_00410820
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0042E8B8 push 0042E8E4h; ret 2_2_0042E8DC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00430910 push 00430970h; ret 2_2_00430968
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00422924 push 00422967h; ret 2_2_0042295F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00418930 push ecx; mov dword ptr [esp], edx2_2_00418935
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0044A9F0 push ecx; mov dword ptr [esp], edx2_2_0044A9F4
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_0045E988 push 0045E9B4h; ret 2_2_0045E9AC
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00418A50 push ecx; mov dword ptr [esp], edx2_2_00418A55
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00460A20 push 00460A53h; ret 2_2_00460A4B
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 2_2_00432AD0 push 00432B1Ch; ret 2_2_00432B14
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce my5Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce my5Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce my5Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce my5Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: \Device\RasAcd count: 112826Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeWindow / User API: threadDelayed 6622Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 7380Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 2614Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeAPI coverage: 4.2 %
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exe TID: 7476Thread sleep time: -66220s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeThread sleep count: Count: 6622 delay: -10Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: RegSvcs.exe, 00000002.00000002.2628960129.000000000103F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RegSvcs.exe, 00000002.00000002.2628960129.000000000103F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeAPI call chain: ExitProcess graph end nodegraph_0-87806
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeAPI call chain: ExitProcess graph end nodegraph_0-85540
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base address: 400000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 401000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 48F000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 491000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 495000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 49D000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 4A2000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 4A3000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 4A4000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 4AD000Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: D58008Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
            Source: RegSvcs.exe, 00000002.00000002.2631420209.0000000002DBA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager}`
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh<
            Source: hgTNnG8vjD.exe, 00000000.00000002.2631120472.0000000004194000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerft\Windows\CurrentVersion\Explorer\AdvancedFCC0BB
            Source: hgTNnG8vjD.exe, 00000000.00000002.2631285954.0000000004266000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2631420209.0000000002DBA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: hgTNnG8vjD.exe, hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndjjh
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanjhh
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndjh
            Source: RegSvcs.exe, 00000002.00000002.2631420209.0000000002DBA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager1
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanU
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywndTrayNotifyWndTrayClockWClassjh
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ButtonShell_TrayWndj
            Source: hgTNnG8vjD.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywndReBarWindow32jh
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywndReBarWindow32jhD
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_traywnd
            Source: hgTNnG8vjD.exe, 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, hgTNnG8vjD.exe, 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndPjjh
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,2_2_00406C2C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,2_2_00406D38
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
            Source: hgTNnG8vjD.exeBinary or memory string: WIN_XP
            Source: hgTNnG8vjD.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
            Source: hgTNnG8vjD.exeBinary or memory string: WIN_XPe
            Source: hgTNnG8vjD.exeBinary or memory string: WIN_VISTA
            Source: hgTNnG8vjD.exeBinary or memory string: WIN_7
            Source: hgTNnG8vjD.exeBinary or memory string: WIN_8
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
            Source: C:\Users\user\Desktop\hgTNnG8vjD.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            LSASS Driver
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            121
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Shared Modules
            1
            DLL Side-Loading
            1
            LSASS Driver
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol121
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt2
            Valid Accounts
            1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            2
            Valid Accounts
            1
            DLL Side-Loading
            NTDS25
            System Information Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            Masquerading
            LSA Secrets21
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials12
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
            Registry Run Keys / Startup Folder
            12
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            hgTNnG8vjD.exe46%VirustotalBrowse
            hgTNnG8vjD.exe39%ReversingLabsWin32.Backdoor.DarkComet
            hgTNnG8vjD.exe100%AviraHEUR/AGEN.1321677
            hgTNnG8vjD.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalse
              high
              kasavetia.no-ip.biz
              unknown
              unknowntrue
                unknown
                eu3.no-ip.biz
                unknown
                unknowntrue
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1589394
                  Start date and time:2025-01-12 07:10:12 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 53s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:hgTNnG8vjD.exe
                  renamed because original name is a hash value
                  Original Sample Name:9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/0@52/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 67
                  • Number of non-executed functions: 290
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  01:11:40API Interceptor184468x Sleep call for process: RegSvcs.exe modified
                  06:11:11AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce my5 C:\Users\user\AppData\Local\Temp\my5\YffwNrk.exe
                  06:11:19AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce my5 C:\Users\user\AppData\Local\Temp\my5\YffwNrk.exe
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bg.microsoft.map.fastly.nethttps://pub-ce1f93897bdf44e9b1cd99ad0325c570.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 199.232.210.172
                  281388015101323984.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.210.172
                  305861283730376077.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.214.172
                  14444181562539231561.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.210.172
                  733422181158883785.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.210.172
                  2836992752554325080.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.210.172
                  1274320496157183071.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.214.172
                  10323218772870612560.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.210.172
                  106161149748268293.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.214.172
                  19559251331544623964.jsGet hashmaliciousStrela DownloaderBrowse
                  • 199.232.214.172
                  No context
                  No context
                  No context
                  No created / dropped files found
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.697733512706755
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:hgTNnG8vjD.exe
                  File size:1'779'958 bytes
                  MD5:42569d9b139c0093fa393444dfbea52e
                  SHA1:0f661a3a1b6b9c728e8949d14db45af6e4f0d103
                  SHA256:9423bc1d281e52a2b42d4c4904c9ac774dcac46aa278c28fa8d0e0b949c70564
                  SHA512:a88369d7bacea297de1c5a6c9a795624d5d0c0a7a883d86c38919824bf97dcbd847f53aa411ab9e8ff82ead72b918f5c5e014dd0b1db9ee8f1b63bb69d267ee3
                  SSDEEP:49152:7JZoQrbTFZY1iaCfnJxpCJOj6ToF1QtrOr10Z/GX:7trbTA1G4OeU4tk0ZOX
                  TLSH:C0850222B5C65075C2B333B19E7AF7AA9A3D79360332D2DB27C81D714EA05412B39763
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                  Icon Hash:1733312925935517
                  Entrypoint:0x4165c1
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                  Instruction
                  call 00007F55F91ABABBh
                  jmp 00007F55F91A292Eh
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ebp
                  mov ebp, esp
                  push edi
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  mov ecx, dword ptr [ebp+10h]
                  mov edi, dword ptr [ebp+08h]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007F55F91A2AAAh
                  cmp edi, eax
                  jc 00007F55F91A2C46h
                  cmp ecx, 00000080h
                  jc 00007F55F91A2ABEh
                  cmp dword ptr [004A9724h], 00000000h
                  je 00007F55F91A2AB5h
                  push edi
                  push esi
                  and edi, 0Fh
                  and esi, 0Fh
                  cmp edi, esi
                  pop esi
                  pop edi
                  jne 00007F55F91A2AA7h
                  jmp 00007F55F91A2E82h
                  test edi, 00000003h
                  jne 00007F55F91A2AB6h
                  shr ecx, 02h
                  and edx, 03h
                  cmp ecx, 08h
                  jc 00007F55F91A2ACBh
                  rep movsd
                  jmp dword ptr [00416740h+edx*4]
                  mov eax, edi
                  mov edx, 00000003h
                  sub ecx, 04h
                  jc 00007F55F91A2AAEh
                  and eax, 03h
                  add ecx, eax
                  jmp dword ptr [00416654h+eax*4]
                  jmp dword ptr [00416750h+ecx*4]
                  nop
                  jmp dword ptr [004166D4h+ecx*4]
                  nop
                  inc cx
                  add byte ptr [eax-4BFFBE9Ah], dl
                  inc cx
                  add byte ptr [ebx], ah
                  ror dword ptr [edx-75F877FAh], 1
                  inc esi
                  add dword ptr [eax+468A0147h], ecx
                  add al, cl
                  jmp 00007F55FB61B2A7h
                  add esi, 03h
                  add edi, 03h
                  cmp ecx, 08h
                  jc 00007F55F91A2A6Eh
                  rep movsd
                  jmp dword ptr [00000000h+edx*4]
                  Programming Language:
                  • [ C ] VS2010 SP1 build 40219
                  • [C++] VS2010 SP1 build 40219
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2010 SP1 build 40219
                  • [RES] VS2010 SP1 build 40219
                  • [LNK] VS2010 SP1 build 40219
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                  RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                  RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                  RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                  RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                  RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                  RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                  RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                  DLLImport
                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                  USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                  GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                  OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 12, 2025 07:11:11.032500982 CET5377853192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:11.041121006 CET53537781.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:11.460659981 CET6403253192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:11.469599009 CET53640321.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:15.960539103 CET4978453192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:15.970261097 CET53497841.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:16.585747957 CET5774153192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:16.599122047 CET53577411.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:20.913794994 CET5058653192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:20.922000885 CET53505861.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:21.554433107 CET5380753192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:21.563051939 CET53538071.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:25.851231098 CET5785453192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:25.859534979 CET53578541.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:26.491812944 CET5586253192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:26.500015974 CET53558621.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:30.773225069 CET5670853192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:30.782426119 CET53567081.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:32.007514000 CET5696653192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:32.016103029 CET53569661.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:35.710527897 CET5401553192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:35.720642090 CET53540151.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:36.945127964 CET6358053192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:36.954858065 CET53635801.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:40.616965055 CET5144953192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:40.625731945 CET53514491.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:41.851394892 CET5438353192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:41.859895945 CET53543831.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:45.601264000 CET6415453192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:45.609204054 CET53641541.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:46.543889999 CET5630353192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:46.552405119 CET53563031.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:50.913865089 CET5043853192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:50.921987057 CET53504381.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:51.820496082 CET6052453192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:51.829123020 CET53605241.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:55.820090055 CET5401953192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:55.828764915 CET53540191.1.1.1192.168.2.9
                  Jan 12, 2025 07:11:56.570074081 CET6208453192.168.2.91.1.1.1
                  Jan 12, 2025 07:11:56.579430103 CET53620841.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:00.554683924 CET5786453192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:00.563114882 CET53578641.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:01.523149967 CET5095653192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:01.532073975 CET53509561.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:05.523181915 CET6219053192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:05.530647039 CET53621901.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:06.460491896 CET5771653192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:06.467693090 CET53577161.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:10.523225069 CET5881853192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:10.531938076 CET53588181.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:11.476340055 CET6520253192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:11.484965086 CET53652021.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:15.460844994 CET6548453192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:15.469279051 CET53654841.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:16.491864920 CET6177553192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:16.500611067 CET53617751.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:20.460582972 CET5239953192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:20.470036030 CET53523991.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:21.479729891 CET5857653192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:21.488456964 CET53585761.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:25.461544991 CET5723353192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:25.470385075 CET53572331.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:26.460678101 CET5413553192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:26.469707012 CET53541351.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:30.460496902 CET6238353192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:30.468992949 CET53623831.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:31.460515976 CET5256353192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:31.469276905 CET53525631.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:35.460438013 CET6021253192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:35.469578028 CET53602121.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:36.460725069 CET5432853192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:36.469320059 CET53543281.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:40.460751057 CET6547753192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:40.468609095 CET53654771.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:41.460735083 CET6227553192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:41.467952013 CET53622751.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:45.711544037 CET5782753192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:45.720774889 CET53578271.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:46.460680962 CET5703053192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:46.468111992 CET53570301.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:50.460522890 CET6367953192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:50.469788074 CET53636791.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:51.460541010 CET5883553192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:51.469377995 CET53588351.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:55.460855961 CET6372453192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:55.469090939 CET53637241.1.1.1192.168.2.9
                  Jan 12, 2025 07:12:56.461005926 CET5096753192.168.2.91.1.1.1
                  Jan 12, 2025 07:12:56.469233036 CET53509671.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:00.460949898 CET5238453192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:00.469588995 CET53523841.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:01.461560965 CET5794153192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:01.470452070 CET53579411.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:05.502003908 CET5318953192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:05.510554075 CET53531891.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:06.462879896 CET5563453192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:06.471136093 CET53556341.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:10.460505962 CET5200153192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:10.469372988 CET53520011.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:11.460959911 CET5891053192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:11.469872952 CET53589101.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:19.585838079 CET6419153192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:19.593051910 CET53641911.1.1.1192.168.2.9
                  Jan 12, 2025 07:13:20.007695913 CET5013453192.168.2.91.1.1.1
                  Jan 12, 2025 07:13:20.015003920 CET53501341.1.1.1192.168.2.9
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jan 12, 2025 07:11:11.032500982 CET192.168.2.91.1.1.10xbc0bStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:11.460659981 CET192.168.2.91.1.1.10x10a0Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:15.960539103 CET192.168.2.91.1.1.10xe0a6Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:16.585747957 CET192.168.2.91.1.1.10xb36Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:20.913794994 CET192.168.2.91.1.1.10xc26eStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:21.554433107 CET192.168.2.91.1.1.10x850Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:25.851231098 CET192.168.2.91.1.1.10xe8c5Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:26.491812944 CET192.168.2.91.1.1.10xbb7bStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:30.773225069 CET192.168.2.91.1.1.10xbe05Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:32.007514000 CET192.168.2.91.1.1.10xa53fStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:35.710527897 CET192.168.2.91.1.1.10xe628Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:36.945127964 CET192.168.2.91.1.1.10x45a9Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:40.616965055 CET192.168.2.91.1.1.10x54a6Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:41.851394892 CET192.168.2.91.1.1.10xad78Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:45.601264000 CET192.168.2.91.1.1.10x2640Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:46.543889999 CET192.168.2.91.1.1.10x8b4Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:50.913865089 CET192.168.2.91.1.1.10x8dafStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:51.820496082 CET192.168.2.91.1.1.10xf560Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:55.820090055 CET192.168.2.91.1.1.10x3c5eStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:11:56.570074081 CET192.168.2.91.1.1.10xc6bfStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:00.554683924 CET192.168.2.91.1.1.10xc95cStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:01.523149967 CET192.168.2.91.1.1.10xc585Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:05.523181915 CET192.168.2.91.1.1.10xa2e6Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:06.460491896 CET192.168.2.91.1.1.10x9543Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:10.523225069 CET192.168.2.91.1.1.10xef8Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:11.476340055 CET192.168.2.91.1.1.10xcbfaStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:15.460844994 CET192.168.2.91.1.1.10xc8c7Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:16.491864920 CET192.168.2.91.1.1.10x8963Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:20.460582972 CET192.168.2.91.1.1.10x91d7Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:21.479729891 CET192.168.2.91.1.1.10x441bStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:25.461544991 CET192.168.2.91.1.1.10xeb3Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:26.460678101 CET192.168.2.91.1.1.10x61cbStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:30.460496902 CET192.168.2.91.1.1.10xad3aStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:31.460515976 CET192.168.2.91.1.1.10x4a57Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:35.460438013 CET192.168.2.91.1.1.10x530bStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:36.460725069 CET192.168.2.91.1.1.10x7b7dStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:40.460751057 CET192.168.2.91.1.1.10x4156Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:41.460735083 CET192.168.2.91.1.1.10x7b72Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:45.711544037 CET192.168.2.91.1.1.10xd433Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:46.460680962 CET192.168.2.91.1.1.10xf75fStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:50.460522890 CET192.168.2.91.1.1.10xcd50Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:51.460541010 CET192.168.2.91.1.1.10x1814Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:55.460855961 CET192.168.2.91.1.1.10xab38Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:56.461005926 CET192.168.2.91.1.1.10x4a2aStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:00.460949898 CET192.168.2.91.1.1.10x1c98Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:01.461560965 CET192.168.2.91.1.1.10x528bStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:05.502003908 CET192.168.2.91.1.1.10xe49dStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:06.462879896 CET192.168.2.91.1.1.10xce41Standard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:10.460505962 CET192.168.2.91.1.1.10xf20eStandard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:11.460959911 CET192.168.2.91.1.1.10xe0ebStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:19.585838079 CET192.168.2.91.1.1.10x3752Standard query (0)kasavetia.no-ip.bizA (IP address)IN (0x0001)false
                  Jan 12, 2025 07:13:20.007695913 CET192.168.2.91.1.1.10x59adStandard query (0)eu3.no-ip.bizA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jan 12, 2025 07:12:26.063739061 CET1.1.1.1192.168.2.90x6c1aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                  Jan 12, 2025 07:12:26.063739061 CET1.1.1.1192.168.2.90x6c1aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:01:11:07
                  Start date:12/01/2025
                  Path:C:\Users\user\Desktop\hgTNnG8vjD.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\hgTNnG8vjD.exe"
                  Imagebase:0x400000
                  File size:1'779'958 bytes
                  MD5 hash:42569D9B139C0093FA393444DFBEA52E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1390171225.00000000045AC000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1394721110.00000000045A2000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1394576702.0000000003CE3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1385237936.0000000003CE0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1393236682.0000000004843000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1385321188.00000000046FA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1394856906.0000000004C9C000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1384903333.00000000045A1000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1385154974.00000000045A0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1385036014.0000000004C99000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000000.00000003.1393331740.0000000004991000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:false

                  Target ID:2
                  Start time:01:11:09
                  Start date:12/01/2025
                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                  Imagebase:0xae0000
                  File size:32'768 bytes
                  MD5 hash:3A77A4F220612FA55118FB8D7DDAE83C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:Borland Delphi
                  Yara matches:
                  • Rule: DarkComet_2, Description: DarkComet, Source: 00000002.00000002.2631420209.0000000002DC1000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                  • Rule: DarkComet_2, Description: DarkComet, Source: 00000002.00000002.2631420209.0000000002D6A000.00000004.00001000.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_DarkCometRat, Description: Yara detected DarkComet, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Windows_Trojan_Darkcomet_1df27bcc, Description: unknown, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: RAT_DarkComet, Description: Detects DarkComet RAT, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_1, Description: DarkComet RAT, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: botherder https://github.com/botherder
                  • Rule: DarkComet_3, Description: unknown, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: DarkComet_4, Description: unknown, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: MALWARE_Win_DarkComet, Description: Detects DarkComet, Source: 00000002.00000002.2628646139.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.2628646139.000000000049D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.8%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:9.1%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:50
                    execution_graph 85395 4010e0 85398 401100 85395->85398 85397 4010f8 85399 401113 85398->85399 85401 401120 85399->85401 85402 401184 85399->85402 85403 40114c 85399->85403 85429 401182 85399->85429 85400 40112c DefWindowProcW 85400->85397 85401->85400 85457 401000 Shell_NotifyIconW setSBUpLow 85401->85457 85436 401250 85402->85436 85405 401151 85403->85405 85406 40119d 85403->85406 85409 401219 85405->85409 85410 40115d 85405->85410 85407 4011a3 85406->85407 85408 42afb4 85406->85408 85407->85401 85417 4011b6 KillTimer 85407->85417 85418 4011db SetTimer RegisterWindowMessageW 85407->85418 85452 40f190 10 API calls 85408->85452 85409->85401 85414 401225 85409->85414 85413 401163 85410->85413 85419 42b01d 85410->85419 85420 42afe9 85413->85420 85421 40116c 85413->85421 85459 468b0e 74 API calls setSBUpLow 85414->85459 85415 401193 85415->85397 85416 42b04f 85458 40e0c0 74 API calls setSBUpLow 85416->85458 85451 401000 Shell_NotifyIconW setSBUpLow 85417->85451 85418->85415 85427 401204 CreatePopupMenu 85418->85427 85419->85400 85456 4370f4 52 API calls 85419->85456 85454 40f190 10 API calls 85420->85454 85421->85401 85422 401174 85421->85422 85453 45fd57 65 API calls setSBUpLow 85422->85453 85427->85397 85429->85400 85430 42afe4 85430->85415 85431 42b00e 85455 401a50 370 API calls 85431->85455 85432 4011c9 PostQuitMessage 85432->85397 85435 42afdc 85435->85400 85435->85430 85437 401262 setSBUpLow 85436->85437 85438 4012e8 85436->85438 85460 401b80 85437->85460 85438->85415 85440 4012d1 KillTimer SetTimer 85440->85438 85441 40128c 85441->85440 85442 4012bb 85441->85442 85443 4272ec 85441->85443 85444 4012c5 85442->85444 85445 42733f 85442->85445 85446 4272f4 Shell_NotifyIconW 85443->85446 85447 42731a Shell_NotifyIconW 85443->85447 85444->85440 85450 427393 Shell_NotifyIconW 85444->85450 85448 427348 Shell_NotifyIconW 85445->85448 85449 42736e Shell_NotifyIconW 85445->85449 85446->85440 85447->85440 85448->85440 85449->85440 85450->85440 85451->85432 85452->85415 85453->85435 85454->85431 85455->85429 85456->85429 85457->85416 85458->85429 85459->85430 85461 401b9c 85460->85461 85481 401c7e 85460->85481 85482 4013c0 52 API calls 85461->85482 85463 401bac 85464 42722b LoadStringW 85463->85464 85465 401bb9 85463->85465 85467 427246 85464->85467 85483 402160 85465->85483 85497 40e0a0 85467->85497 85468 401bcd 85470 427258 85468->85470 85471 401bda 85468->85471 85501 40d200 52 API calls 2 library calls 85470->85501 85471->85467 85472 401be4 85471->85472 85496 40d200 52 API calls 2 library calls 85472->85496 85475 427267 85476 401bf3 setSBUpLow _wcscpy _wcsncpy 85475->85476 85477 42727b 85475->85477 85480 401c62 Shell_NotifyIconW 85476->85480 85502 40d200 52 API calls 2 library calls 85477->85502 85479 427289 85480->85481 85481->85441 85482->85463 85484 426daa 85483->85484 85485 40216b _wcslen 85483->85485 85516 40c600 85484->85516 85488 402180 85485->85488 85489 40219e 85485->85489 85487 426db5 85487->85468 85503 403bd0 52 API calls moneypunct 85488->85503 85504 4013a0 52 API calls 85489->85504 85492 402187 _memmove 85492->85468 85493 4021a5 85494 426db7 85493->85494 85505 4115d7 85493->85505 85496->85476 85498 40e0b2 85497->85498 85499 40e0a8 85497->85499 85498->85476 85552 403c30 52 API calls _memmove 85499->85552 85501->85475 85502->85479 85503->85492 85504->85493 85507 4115e1 _malloc 85505->85507 85508 4115fb 85507->85508 85512 4115fd std::exception::exception 85507->85512 85521 4135bb 85507->85521 85508->85492 85509 41163b 85536 4180af 46 API calls std::exception::operator= 85509->85536 85511 411645 85537 418105 RaiseException 85511->85537 85512->85509 85535 41130a 51 API calls __cinit 85512->85535 85515 411656 85517 40c619 85516->85517 85518 40c60a 85516->85518 85517->85487 85518->85517 85544 4026f0 85518->85544 85520 426d7a _memmove 85520->85487 85522 413638 _malloc 85521->85522 85526 4135c9 _malloc 85521->85526 85543 417f77 46 API calls __getptd_noexit 85522->85543 85525 4135f7 RtlAllocateHeap 85525->85526 85534 413630 85525->85534 85526->85525 85528 413624 85526->85528 85531 413622 85526->85531 85532 4135d4 85526->85532 85541 417f77 46 API calls __getptd_noexit 85528->85541 85542 417f77 46 API calls __getptd_noexit 85531->85542 85532->85526 85538 418901 46 API calls __NMSG_WRITE 85532->85538 85539 418752 46 API calls 7 library calls 85532->85539 85540 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 85532->85540 85534->85507 85535->85509 85536->85511 85537->85515 85538->85532 85539->85532 85541->85531 85542->85534 85543->85534 85545 426873 85544->85545 85546 4026ff 85544->85546 85551 4013a0 52 API calls 85545->85551 85546->85520 85548 42687b 85549 4115d7 52 API calls 85548->85549 85550 42689e _memmove 85549->85550 85550->85520 85551->85548 85552->85498 85553 42d142 85557 480a8d 85553->85557 85555 42d14f 85556 480a8d 370 API calls 85555->85556 85556->85555 85558 480ae4 85557->85558 85559 480b26 85557->85559 85561 480aeb 85558->85561 85562 480b15 85558->85562 85588 40bc70 85559->85588 85564 480aee 85561->85564 85565 480b04 85561->85565 85595 4805bf 370 API calls 85562->85595 85564->85559 85567 480af3 85564->85567 85594 47fea2 370 API calls __itow_s 85565->85594 85593 47f135 370 API calls 85567->85593 85569 40e0a0 52 API calls 85581 480b2e 85569->85581 85572 480aff 85622 408f40 85572->85622 85573 481156 85574 408f40 VariantClear 85573->85574 85575 48115e 85574->85575 85575->85555 85576 40e710 53 API calls 85576->85581 85579 40c2c0 52 API calls 85579->85581 85580 408e80 VariantClear 85580->85581 85581->85569 85581->85572 85581->85576 85581->85579 85581->85580 85582 40a780 370 API calls 85581->85582 85584 480ff5 85581->85584 85596 401980 85581->85596 85604 45377f 52 API calls 85581->85604 85605 45e951 53 API calls 85581->85605 85606 40e830 85581->85606 85619 47925f 53 API calls 85581->85619 85620 47fcff 370 API calls 85581->85620 85582->85581 85621 45e737 90 API calls 3 library calls 85584->85621 85589 4115d7 52 API calls 85588->85589 85590 40bc98 85589->85590 85591 4115d7 52 API calls 85590->85591 85592 40bca6 85591->85592 85592->85581 85593->85572 85594->85572 85595->85572 85597 4019a3 85596->85597 85601 401985 85596->85601 85598 4019b8 85597->85598 85597->85601 85600 403e10 53 API calls 85598->85600 85599 40199f 85599->85581 85603 4019c4 85600->85603 85601->85599 85626 403e10 85601->85626 85603->85581 85604->85581 85605->85581 85607 427c86 85606->85607 85608 40e84a 85606->85608 85651 40e1f0 VariantClear moneypunct 85607->85651 85650 40e950 53 API calls 85608->85650 85611 427c8b 85652 40e950 53 API calls 85611->85652 85612 40e84f 85612->85611 85615 40e85c 85612->85615 85613 4115d7 52 API calls 85616 40e8fc 85613->85616 85615->85613 85618 40e907 85615->85618 85617 4115d7 52 API calls 85616->85617 85617->85618 85618->85581 85619->85581 85620->85581 85621->85572 85623 408f48 moneypunct 85622->85623 85624 4265c7 VariantClear 85623->85624 85625 408f55 moneypunct 85623->85625 85624->85625 85625->85573 85643 403ea0 52 API calls __cinit 85626->85643 85628 403e1d 85629 403e25 85628->85629 85631 428987 85628->85631 85630 4115d7 52 API calls 85629->85630 85632 403e34 85630->85632 85646 408e80 85631->85646 85634 403e44 85632->85634 85636 40bc70 52 API calls 85632->85636 85637 403e51 85634->85637 85644 403c30 52 API calls _memmove 85634->85644 85636->85634 85639 4115d7 52 API calls 85637->85639 85640 403e5e 85639->85640 85645 403da0 52 API calls 85640->85645 85642 403e82 85642->85599 85643->85628 85644->85637 85645->85642 85647 408e88 85646->85647 85649 408e94 85646->85649 85648 408f40 VariantClear 85647->85648 85648->85649 85649->85599 85650->85612 85651->85611 85652->85618 85653 40bd20 85654 428194 85653->85654 85655 40bd2d 85653->85655 85656 40bd43 85654->85656 85658 4281bc 85654->85658 85660 4281b2 85654->85660 85657 40bd37 85655->85657 85676 4531b1 85655->85676 85665 40bd50 85657->85665 85675 45e987 86 API calls moneypunct 85658->85675 85674 40b510 VariantClear 85660->85674 85664 4281ba 85666 426cf1 85665->85666 85667 40bd63 85665->85667 85705 44cde9 52 API calls _memmove 85666->85705 85696 40bd80 85667->85696 85670 40bd73 85670->85656 85671 426cfc 85672 40e0a0 52 API calls 85671->85672 85673 426d02 85672->85673 85674->85664 85675->85655 85677 453375 85676->85677 85678 4531ca 85676->85678 85677->85657 85679 453234 85678->85679 85680 453213 85678->85680 85681 4532b2 85678->85681 85685 4531dd __itow __i64tow _wcscpy 85678->85685 85719 41329b 79 API calls 3 library calls 85679->85719 85718 41329b 79 API calls 3 library calls 85680->85718 85684 4115d7 52 API calls 85681->85684 85689 4532d3 85684->85689 85686 4115d7 52 API calls 85685->85686 85687 453355 85686->85687 85687->85677 85688 401b10 52 API calls 85687->85688 85690 453369 85688->85690 85691 4115d7 52 API calls 85689->85691 85690->85657 85692 453304 85691->85692 85693 453327 moneypunct 85692->85693 85712 401b10 85692->85712 85693->85657 85695 453312 moneypunct 85695->85657 85697 40bd8e 85696->85697 85704 40bdb7 _memmove 85696->85704 85698 40bded 85697->85698 85699 40bdad 85697->85699 85697->85704 85701 4115d7 52 API calls 85698->85701 85706 402f00 85699->85706 85702 40bdf6 85701->85702 85703 4115d7 52 API calls 85702->85703 85702->85704 85703->85704 85704->85670 85705->85671 85707 402f0c 85706->85707 85709 402f10 85706->85709 85707->85704 85708 4268c3 85709->85708 85710 4115d7 52 API calls 85709->85710 85711 402f51 moneypunct _memmove 85710->85711 85711->85704 85713 401b16 _wcslen 85712->85713 85714 4115d7 52 API calls 85713->85714 85717 401b63 85713->85717 85715 401b4b _memmove 85714->85715 85716 4115d7 52 API calls 85715->85716 85716->85717 85717->85695 85718->85685 85719->85685 85720 425ba2 85725 40e360 85720->85725 85722 425bb4 85741 41130a 51 API calls __cinit 85722->85741 85724 425bbe 85726 4115d7 52 API calls 85725->85726 85727 40e3ec GetModuleFileNameW 85726->85727 85742 413a0e 85727->85742 85729 40e421 _wcsncat 85745 413a9e 85729->85745 85732 4115d7 52 API calls 85733 40e45e _wcscpy 85732->85733 85734 40bc70 52 API calls 85733->85734 85735 40e498 85734->85735 85748 40e4c0 85735->85748 85737 40e4a9 85737->85722 85738 401c90 52 API calls 85740 40e4a1 _wcscat _wcslen _wcsncpy 85738->85740 85739 4115d7 52 API calls 85739->85740 85740->85737 85740->85738 85740->85739 85741->85724 85762 413801 85742->85762 85792 419efd 85745->85792 85804 403350 85748->85804 85750 40e4cb RegOpenKeyExW 85751 427190 RegQueryValueExW 85750->85751 85752 40e4eb 85750->85752 85753 4271b0 85751->85753 85754 42721a RegCloseKey 85751->85754 85752->85740 85755 4115d7 52 API calls 85753->85755 85754->85740 85756 4271cb 85755->85756 85811 43652f 52 API calls 85756->85811 85758 4271d8 RegQueryValueExW 85759 4271f7 85758->85759 85761 42720e 85758->85761 85760 402160 52 API calls 85759->85760 85760->85761 85761->85754 85763 41389e 85762->85763 85769 41381a 85762->85769 85764 4139e8 85763->85764 85766 413a00 85763->85766 85789 417f77 46 API calls __getptd_noexit 85764->85789 85791 417f77 46 API calls __getptd_noexit 85766->85791 85767 4139ed 85790 417f25 10 API calls __wsplitpath_helper 85767->85790 85769->85763 85777 41388a 85769->85777 85784 419e30 46 API calls __wsplitpath_helper 85769->85784 85771 413967 85771->85729 85773 41396c 85773->85763 85773->85771 85775 41397a 85773->85775 85774 413929 85774->85763 85776 413945 85774->85776 85786 419e30 46 API calls __wsplitpath_helper 85774->85786 85788 419e30 46 API calls __wsplitpath_helper 85775->85788 85776->85763 85776->85771 85780 41395b 85776->85780 85777->85763 85783 413909 85777->85783 85785 419e30 46 API calls __wsplitpath_helper 85777->85785 85787 419e30 46 API calls __wsplitpath_helper 85780->85787 85783->85773 85783->85774 85784->85777 85785->85783 85786->85776 85787->85771 85788->85771 85789->85767 85790->85771 85791->85771 85793 419f13 85792->85793 85794 419f0e 85792->85794 85801 417f77 46 API calls __getptd_noexit 85793->85801 85794->85793 85797 419f2b 85794->85797 85796 419f18 85802 417f25 10 API calls __wsplitpath_helper 85796->85802 85800 40e454 85797->85800 85803 417f77 46 API calls __getptd_noexit 85797->85803 85800->85732 85801->85796 85802->85800 85803->85796 85805 403367 85804->85805 85806 403358 85804->85806 85807 4115d7 52 API calls 85805->85807 85806->85750 85808 403370 85807->85808 85809 4115d7 52 API calls 85808->85809 85810 40339e 85809->85810 85810->85750 85811->85758 85819 443a87 85829 433396 SendMessageTimeoutW 85819->85829 85821 443a94 85822 443a9f IsWindowVisible 85821->85822 85828 443b06 moneypunct 85821->85828 85823 443ab3 SendMessageW 85822->85823 85824 443aaa 85822->85824 85825 443ac7 85823->85825 85824->85823 85824->85828 85826 4115d7 52 API calls 85825->85826 85827 443ae8 SendMessageW 85826->85827 85827->85828 85829->85821 85830 408ec4 85831 4115d7 52 API calls 85830->85831 85832 408ecb 85831->85832 85833 428905 85834 4115d7 52 API calls 85833->85834 85835 42890c 85834->85835 85836 428945 85835->85836 85837 42891f 85835->85837 85839 4115d7 52 API calls 85836->85839 85838 4115d7 52 API calls 85837->85838 85840 428925 _memmove 85838->85840 85841 42894c 85839->85841 85842 4287ca 85843 4115d7 52 API calls 85842->85843 85844 4287d1 85843->85844 85845 4115d7 52 API calls 85844->85845 85848 4287ea _memmove 85844->85848 85845->85848 85846 4115d7 52 API calls 85847 428812 85846->85847 85848->85846 85849 42b14b 85856 40bc10 85849->85856 85851 42b159 85867 4096a0 85851->85867 85853 42b177 85994 44b92d VariantClear 85853->85994 85855 42bc5b 85857 40bc24 85856->85857 85858 40bc17 85856->85858 85860 40bc2a 85857->85860 85861 40bc3c 85857->85861 85859 408e80 VariantClear 85858->85859 85862 40bc1f 85859->85862 85863 408e80 VariantClear 85860->85863 85864 4115d7 52 API calls 85861->85864 85862->85851 85865 40bc33 85863->85865 85866 40bc43 85864->85866 85865->85851 85866->85851 85868 4096c6 _wcslen 85867->85868 85869 4115d7 52 API calls 85868->85869 85933 40a70c moneypunct _memmove 85868->85933 85870 4096fa _memmove 85869->85870 85872 4115d7 52 API calls 85870->85872 85874 40971b 85872->85874 85873 4297aa 85876 4115d7 52 API calls 85873->85876 85875 409749 CharUpperBuffW 85874->85875 85878 40976a moneypunct 85874->85878 85874->85933 85875->85878 85916 4297d1 _memmove 85876->85916 85924 4097e5 moneypunct 85878->85924 86113 47dcbb 370 API calls 85878->86113 85880 408f40 VariantClear 85881 42ae92 85880->85881 86159 410c60 VariantClear moneypunct 85881->86159 85883 42aea4 85884 409aa2 85886 4115d7 52 API calls 85884->85886 85890 409afe 85884->85890 85884->85916 85885 40a689 85887 4115d7 52 API calls 85885->85887 85886->85890 85904 40a6af moneypunct _memmove 85887->85904 85888 409b2a 85892 429dbe 85888->85892 85895 40b400 2 API calls 85888->85895 85940 409b4d moneypunct _memmove 85888->85940 85890->85888 85891 4115d7 52 API calls 85890->85891 85893 429d31 85891->85893 85897 429dd3 85892->85897 85899 40b400 2 API calls 85892->85899 85896 429d42 85893->85896 86141 44a801 52 API calls 85893->86141 85894 429a46 VariantClear 85894->85924 85895->85892 85909 40e0a0 52 API calls 85896->85909 85897->85940 86144 40e1c0 VariantClear moneypunct 85897->86144 85898 408f40 VariantClear 85898->85924 85899->85897 85901 40a045 85906 4115d7 52 API calls 85901->85906 85902 42a3f5 86146 47390f VariantClear 85902->86146 85914 4115d7 52 API calls 85904->85914 85915 40a04c 85906->85915 85907 4115d7 52 API calls 85907->85924 85910 429d57 85909->85910 86142 453443 52 API calls 85910->86142 85912 42a42f 86147 45e737 90 API calls 3 library calls 85912->86147 85914->85933 85919 40a0a7 85915->85919 86036 4091e0 85915->86036 86158 45e737 90 API calls 3 library calls 85916->86158 85917 4299d9 85922 408f40 VariantClear 85917->85922 85941 40a0af 85919->85941 86148 40c790 VariantClear moneypunct 85919->86148 85921 429abd 85921->85853 85925 4299e2 85922->85925 85923 429d88 86143 453443 52 API calls 85923->86143 85924->85884 85924->85885 85924->85894 85924->85898 85924->85904 85924->85907 85924->85916 85924->85917 85924->85921 85931 42a452 85924->85931 85995 40a780 85924->85995 86114 40c2c0 85924->86114 86132 40c4e0 370 API calls 85924->86132 86134 40ba10 85924->86134 86140 40e270 VariantClear moneypunct 85924->86140 86133 410c60 VariantClear moneypunct 85925->86133 85928 403e10 53 API calls 85928->85940 85931->85880 86112 4013a0 52 API calls 85933->86112 85934 402780 52 API calls 85934->85940 85935 4115d7 52 API calls 85935->85940 85937 44a801 52 API calls 85937->85940 85938 40a650 moneypunct 85938->85853 85939 408f40 VariantClear 85969 40a162 moneypunct _memmove 85939->85969 85940->85902 85940->85912 85940->85928 85940->85933 85940->85934 85940->85935 85940->85937 85944 40a780 356 API calls 85940->85944 85946 401980 53 API calls 85940->85946 85947 408e80 VariantClear 85940->85947 85953 41130a 51 API calls __cinit 85940->85953 85956 409fd2 85940->85956 85958 409c95 85940->85958 86145 45f508 52 API calls 85940->86145 85942 40a11b 85941->85942 85943 42a4b4 VariantClear 85941->85943 85941->85969 85949 40a12d moneypunct 85942->85949 86149 40e270 VariantClear moneypunct 85942->86149 85943->85949 85944->85940 85946->85940 85947->85940 85948 4115d7 52 API calls 85948->85969 85949->85948 85949->85969 85950 408e80 VariantClear 85950->85969 85952 42a74d VariantClear 85952->85969 85953->85940 85954 40a368 85955 42aad4 85954->85955 85963 40a397 85954->85963 86152 46fe90 VariantClear VariantClear moneypunct 85955->86152 85956->85901 85956->85902 85957 42a7e4 VariantClear 85957->85969 85958->85853 85959 42a886 VariantClear 85959->85969 85960 40a3ce 85975 40a3d9 moneypunct 85960->85975 86102 40b400 85960->86102 85962 40e270 VariantClear 85962->85969 85963->85960 85964 40b400 2 API calls 85963->85964 85986 40a42c moneypunct 85963->85986 85964->85960 85966 4115d7 52 API calls 85966->85969 85967 42abaf 85971 42abd4 VariantClear 85967->85971 85981 40a4ee moneypunct 85967->85981 85968 4115d7 52 API calls 85972 42a5a6 VariantInit VariantCopy 85968->85972 85969->85939 85969->85950 85969->85952 85969->85954 85969->85955 85969->85957 85969->85959 85969->85962 85969->85966 85969->85968 86150 470870 52 API calls 85969->86150 86151 44ccf1 VariantClear moneypunct 85969->86151 85970 40a4dc 85970->85981 86154 40e270 VariantClear moneypunct 85970->86154 85971->85981 85972->85969 85977 42a5c6 VariantClear 85972->85977 85973 42ac4f 85982 42ac79 VariantClear 85973->85982 85988 40a546 moneypunct 85973->85988 85976 40a41a 85975->85976 85979 42ab44 VariantClear 85975->85979 85975->85986 85976->85986 86153 40e270 VariantClear moneypunct 85976->86153 85977->85969 85978 40a534 85978->85988 86155 40e270 VariantClear moneypunct 85978->86155 85979->85986 85981->85973 85981->85978 85982->85988 85983 42ad28 85989 42ad4e VariantClear 85983->85989 85993 40a583 moneypunct 85983->85993 85985 40a571 85985->85993 86156 40e270 VariantClear moneypunct 85985->86156 85986->85967 85986->85970 85988->85983 85988->85985 85989->85993 85991 42ae0e VariantClear 85991->85993 85993->85938 85993->85991 86157 40e270 VariantClear moneypunct 85993->86157 85994->85855 85996 40a7a6 85995->85996 85997 40ae8c 85995->85997 85998 4115d7 52 API calls 85996->85998 86174 41130a 51 API calls __cinit 85997->86174 86033 40a7c6 moneypunct _memmove 85998->86033 86000 40a86d 86002 40abd1 86000->86002 86017 40a878 moneypunct 86000->86017 86001 408e80 VariantClear 86001->86033 86179 45e737 90 API calls 3 library calls 86002->86179 86004 40bc10 53 API calls 86004->86033 86005 401b10 52 API calls 86005->86033 86006 42b791 VariantClear 86006->86033 86007 42ba2d VariantClear 86007->86033 86008 408f40 VariantClear 86008->86017 86009 42b459 VariantClear 86009->86033 86010 40a884 moneypunct 86010->85924 86012 42b6f6 VariantClear 86012->86033 86014 42bc5b 86014->85924 86015 4115d7 52 API calls 86015->86033 86016 42bb6a 86182 44b92d VariantClear 86016->86182 86017->86008 86017->86010 86018 40e270 VariantClear 86018->86033 86019 42bbf5 86180 45e737 90 API calls 3 library calls 86019->86180 86021 4115d7 52 API calls 86025 42b5b3 VariantInit VariantCopy 86021->86025 86022 40b5f0 89 API calls 86022->86033 86024 408f40 VariantClear 86024->86033 86027 42b5d7 VariantClear 86025->86027 86025->86033 86027->86033 86029 42bc37 86181 45e737 90 API calls 3 library calls 86029->86181 86032 42bc48 86032->86016 86034 408f40 VariantClear 86032->86034 86033->86000 86033->86001 86033->86002 86033->86004 86033->86005 86033->86006 86033->86007 86033->86009 86033->86012 86033->86015 86033->86016 86033->86018 86033->86019 86033->86021 86033->86022 86033->86024 86033->86029 86035 4530c9 VariantClear 86033->86035 86160 408cc0 86033->86160 86175 45308a 53 API calls 86033->86175 86176 470870 52 API calls 86033->86176 86177 457f66 87 API calls __write_nolock 86033->86177 86178 472f47 127 API calls 86033->86178 86034->86016 86035->86033 86037 409202 86036->86037 86038 42d7ad 86036->86038 86095 409216 moneypunct 86037->86095 87290 410940 370 API calls 86037->87290 87293 45e737 90 API calls 3 library calls 86038->87293 86041 409386 86042 40939c 86041->86042 87291 40f190 10 API calls 86041->87291 86042->85919 86044 4095b2 86044->86042 86046 4095bf 86044->86046 86045 409253 PeekMessageW 86045->86095 87292 401a50 370 API calls 86046->87292 86048 40d410 VariantClear 86048->86095 86049 42d8cd Sleep 86049->86095 86050 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86050->86042 86053 4095f9 86050->86053 86052 42e13b 87323 40d410 VariantClear 86052->87323 86056 42e158 TranslateMessage DispatchMessageW GetMessageW 86053->86056 86056->86056 86057 42e188 86056->86057 86057->86042 86058 465124 53 API calls 86058->86095 86059 409567 PeekMessageW 86059->86095 86061 44c29d 52 API calls 86101 42da45 86061->86101 86062 46f3c1 107 API calls 86062->86095 86063 40e0a0 52 API calls 86063->86095 86064 46fdbf 108 API calls 86064->86101 86065 42dcd2 WaitForSingleObject 86070 42dcf0 GetExitCodeProcess CloseHandle 86065->86070 86065->86095 86066 409551 TranslateMessage DispatchMessageW 86066->86059 86068 42dd3d Sleep 86068->86101 86069 47d33e 348 API calls 86069->86095 87315 40d410 VariantClear 86070->87315 86072 4094cf Sleep 86072->86095 86075 408f40 VariantClear 86075->86101 86077 42d94d timeGetTime 87285 465124 86077->87285 86078 443d19 67 API calls 86078->86101 86079 40c620 timeGetTime 86079->86095 86082 465124 53 API calls 86082->86101 86083 42dd89 CloseHandle 86083->86101 86085 42de19 GetExitCodeProcess CloseHandle 86085->86101 86086 403cd0 VariantClear 86088 42de88 Sleep 86086->86088 86088->86095 86090 4096a0 348 API calls 86090->86095 86092 408cc0 348 API calls 86092->86095 86093 42e0cc VariantClear 86093->86095 86094 408f40 VariantClear 86094->86095 86095->86041 86095->86045 86095->86048 86095->86049 86095->86052 86095->86058 86095->86059 86095->86062 86095->86063 86095->86065 86095->86066 86095->86068 86095->86069 86095->86072 86095->86077 86095->86079 86095->86090 86095->86092 86095->86093 86095->86094 86097 45e737 90 API calls 86095->86097 86095->86101 87155 4091b0 86095->87155 87213 40afa0 86095->87213 87239 408fc0 86095->87239 87274 40d150 86095->87274 87279 40d170 86095->87279 87322 40e270 VariantClear moneypunct 86095->87322 86096 401b10 52 API calls 86096->86101 86097->86095 86099 401980 53 API calls 86099->86101 86101->86061 86101->86064 86101->86075 86101->86078 86101->86082 86101->86083 86101->86085 86101->86086 86101->86088 86101->86095 86101->86096 86101->86099 87294 45178a 54 API calls 86101->87294 87295 47d33e 86101->87295 87314 453bc6 54 API calls 86101->87314 87316 40c620 timeGetTime 86101->87316 87318 40d410 VariantClear 86101->87318 87319 4574b4 VariantClear 86101->87319 87320 4731e1 VariantClear 86101->87320 87321 4331a2 6 API calls 86101->87321 86103 40b40f 86102->86103 86111 40b45e moneypunct 86102->86111 86104 40b41f 86103->86104 86105 40b400 VariantClear 86103->86105 86106 40b400 VariantClear 86104->86106 86109 40b42a moneypunct 86104->86109 86105->86104 86106->86109 86107 40b44c 86107->86111 87383 40e270 VariantClear moneypunct 86107->87383 86108 42839c VariantClear 86108->86111 86109->86107 86109->86108 86109->86111 86111->85975 86112->85873 86113->85878 86115 40c2c7 86114->86115 86116 40c30e 86114->86116 86119 40c2d3 86115->86119 86120 426c79 86115->86120 86117 40c315 86116->86117 86118 426c2b 86116->86118 86121 40c321 86117->86121 86122 426c5a 86117->86122 86124 426c4b 86118->86124 86125 426c2e 86118->86125 87384 403ea0 52 API calls __cinit 86119->87384 87389 4534e3 52 API calls 86120->87389 87385 403ea0 52 API calls __cinit 86121->87385 87388 4534e3 52 API calls 86122->87388 87387 4534e3 52 API calls 86124->87387 86131 40c2de 86125->86131 87386 4534e3 52 API calls 86125->87386 86131->85924 86132->85924 86133->85938 86135 40ba49 86134->86135 86139 40ba1b moneypunct _memmove 86134->86139 86137 4115d7 52 API calls 86135->86137 86136 4115d7 52 API calls 86138 40ba22 86136->86138 86137->86139 86138->85924 86139->86136 86140->85924 86141->85896 86142->85923 86143->85888 86144->85940 86145->85940 86146->85912 86147->85931 86148->85919 86149->85949 86150->85969 86151->85969 86152->85960 86153->85986 86154->85981 86155->85988 86156->85993 86157->85993 86158->85931 86159->85883 86183 408d90 86160->86183 86162 429778 86220 410c60 VariantClear moneypunct 86162->86220 86164 429780 86165 408cf9 86165->86162 86166 42976c 86165->86166 86168 408d2d 86165->86168 86219 45e737 90 API calls 3 library calls 86166->86219 86199 403d10 86168->86199 86171 408d71 moneypunct 86171->86033 86172 408f40 VariantClear 86173 408d45 moneypunct 86172->86173 86173->86171 86173->86172 86174->86033 86175->86033 86176->86033 86177->86033 86178->86033 86179->86016 86180->86016 86181->86032 86182->86014 86184 4289d2 86183->86184 86185 408db3 86183->86185 86225 45e737 90 API calls 3 library calls 86184->86225 86221 40bec0 86185->86221 86188 4289e5 86226 45e737 90 API calls 3 library calls 86188->86226 86190 40ba10 52 API calls 86195 408dc9 86190->86195 86191 428a05 86192 408f40 VariantClear 86191->86192 86198 408e5a 86192->86198 86193 40a780 370 API calls 86193->86195 86194 408e64 86196 408f40 VariantClear 86194->86196 86195->86188 86195->86190 86195->86191 86195->86193 86195->86194 86197 408f40 VariantClear 86195->86197 86195->86198 86196->86198 86197->86195 86198->86165 86200 408f40 VariantClear 86199->86200 86201 403d20 86200->86201 86228 403cd0 86201->86228 86203 403d4d 86232 474fad 86203->86232 86248 4755c4 86203->86248 86270 474d55 86203->86270 86286 4813fa 86203->86286 86296 4573de 86203->86296 86301 457e3f 86203->86301 86312 45cd1e 86203->86312 86340 47abd3 86203->86340 86359 474e7f 86203->86359 86375 40d3b0 86203->86375 86382 46beb2 86203->86382 86455 46b9d7 86203->86455 86555 45c9a0 86203->86555 86573 4755ad 86203->86573 86204 403d76 86204->86162 86204->86173 86219->86162 86220->86164 86222 40bed0 86221->86222 86223 40bef2 86222->86223 86227 45e737 90 API calls 3 library calls 86222->86227 86223->86195 86225->86188 86226->86191 86227->86223 86229 403cdf 86228->86229 86230 408f40 VariantClear 86229->86230 86231 403ce7 86230->86231 86231->86203 86233 475005 86232->86233 86234 474fc0 86232->86234 86576 4533eb 86233->86576 86587 44b3ac 57 API calls 86234->86587 86238 474fcc 86240 474fd0 86238->86240 86241 474ff9 86238->86241 86244 408f40 VariantClear 86240->86244 86588 44b3ac 57 API calls 86241->86588 86243 475046 86246 47504f 86243->86246 86247 408f40 VariantClear 86243->86247 86245 474fd8 86244->86245 86245->86204 86246->86204 86247->86246 86249 4755d1 __write_nolock 86248->86249 86250 40bc70 52 API calls 86249->86250 86251 4755e3 86250->86251 86252 4755fa CreateToolhelp32Snapshot Process32FirstW 86251->86252 86256 475624 _wcscat 86252->86256 86253 413a0e __wsplitpath 46 API calls 86253->86256 86254 402160 52 API calls 86254->86256 86256->86253 86256->86254 86257 4756a3 Process32NextW 86256->86257 86628 45340c 86256->86628 86634 4114ab 86256->86634 86257->86256 86259 4756b9 CloseHandle 86257->86259 86260 40e830 53 API calls 86259->86260 86261 4756d3 86260->86261 86642 40cf00 53 API calls 86261->86642 86263 4756e0 86264 408f40 VariantClear 86263->86264 86269 4756ea 86264->86269 86265 40cf00 53 API calls 86265->86269 86266 47577c 86266->86204 86268 408f40 VariantClear 86268->86269 86269->86265 86269->86266 86269->86268 86643 40e710 86269->86643 86271 474d71 86270->86271 86272 474d75 86271->86272 86275 474da5 86271->86275 86273 408f40 VariantClear 86272->86273 86274 474d7d 86273->86274 86274->86204 86276 474dfe 86275->86276 86277 474dce 86275->86277 86278 474e2a 86276->86278 86282 408f40 VariantClear 86276->86282 86279 408f40 VariantClear 86277->86279 86657 46886c 86278->86657 86281 474dd6 86279->86281 86281->86204 86282->86278 86283 474e5b 86284 408f40 VariantClear 86283->86284 86285 474e74 86284->86285 86285->86204 86287 45340c 85 API calls 86286->86287 86288 481438 86287->86288 86785 402880 86288->86785 86290 48143f 86291 481465 86290->86291 86292 40a780 370 API calls 86290->86292 86293 40e710 53 API calls 86291->86293 86294 481469 86291->86294 86292->86291 86295 4814a4 86293->86295 86294->86204 86295->86204 86297 4533eb 85 API calls 86296->86297 86298 4573f1 86297->86298 86299 408f40 VariantClear 86298->86299 86300 4573fc 86299->86300 86300->86204 86302 45340c 85 API calls 86301->86302 86303 457e61 86302->86303 86845 443d19 86303->86845 86305 457e67 86306 457e71 86305->86306 86307 457e9d 86305->86307 86308 408f40 VariantClear 86306->86308 86309 408f40 VariantClear 86307->86309 86310 457e76 86308->86310 86311 457ea2 86309->86311 86310->86204 86311->86204 86313 45340c 85 API calls 86312->86313 86319 45cd44 86313->86319 86314 45340c 85 API calls 86315 45ce31 _wcsncpy 86314->86315 86870 410120 86315->86870 86317 45ce5b 86318 413a0e __wsplitpath 46 API calls 86317->86318 86320 45ce7d _wcscat 86318->86320 86319->86314 86323 45cecb 86319->86323 86321 45cea3 GetCurrentDirectoryW SetCurrentDirectoryW 86320->86321 86322 45ceeb 86321->86322 86321->86323 86874 433998 GetFileAttributesW 86322->86874 86324 408f40 VariantClear 86323->86324 86326 45ced3 86324->86326 86326->86204 86328 45cefe GetFileAttributesW SetFileAttributesW 86331 45cf27 SetCurrentDirectoryW 86328->86331 86332 45cf32 86328->86332 86329 45cf69 86876 431a86 FindFirstFileW 86329->86876 86331->86323 86334 45cf4c SetCurrentDirectoryW 86332->86334 86335 45cf38 SetCurrentDirectoryW 86332->86335 86333 45cf84 86337 45cf9d SetCurrentDirectoryW 86333->86337 86338 408f40 VariantClear 86333->86338 86336 45cf66 _wcscpy 86334->86336 86335->86204 86336->86329 86337->86204 86339 45cf90 86338->86339 86339->86337 86895 471f53 86340->86895 86342 47abe3 86906 46f3c1 86342->86906 86344 47abeb 86345 47abef 86344->86345 86346 47ac1e 86344->86346 86349 408f40 VariantClear 86345->86349 86922 436458 86346->86922 86352 47ac0a 86349->86352 86350 47ac44 86925 443b32 EnumChildWindows 86350->86925 86351 47ac2f 86353 40e710 53 API calls 86351->86353 86352->86204 86355 47ac3c 86353->86355 86355->86204 86356 47ac5a 86357 40e710 53 API calls 86356->86357 86358 47ac65 86357->86358 86358->86204 86360 474e9b 86359->86360 86361 474e9f 86360->86361 86364 474ecf 86360->86364 86362 408f40 VariantClear 86361->86362 86363 474ea7 86362->86363 86363->86204 86366 474f28 86364->86366 86367 474ef8 86364->86367 86365 474f54 86995 468848 86365->86995 86366->86365 86369 408f40 VariantClear 86366->86369 86368 408f40 VariantClear 86367->86368 86371 474f00 86368->86371 86369->86365 86371->86204 86372 474f89 86373 408f40 VariantClear 86372->86373 86374 474fa2 86373->86374 86374->86204 86376 40d3c4 86375->86376 86377 40d3cc timeGetTime 86376->86377 86378 42e19d Sleep 86376->86378 86379 40d3e2 86377->86379 86380 4091e0 368 API calls 86379->86380 86381 40d3fb 86380->86381 86381->86204 86383 40bc70 52 API calls 86382->86383 86384 46bed3 86383->86384 86385 40bc70 52 API calls 86384->86385 86386 46bedc 86385->86386 86387 40bc70 52 API calls 86386->86387 86388 46bee5 86387->86388 86389 40e710 53 API calls 86388->86389 86390 46bef2 86389->86390 86391 45340c 85 API calls 86390->86391 86392 46bf00 86391->86392 86393 401b10 52 API calls 86392->86393 86394 46bf0c 86393->86394 86998 463980 86394->86998 86396 46bf20 87024 46379b 86396->87024 86398 46bf53 86456 40bc70 52 API calls 86455->86456 86457 46b9f8 86456->86457 86458 40bc70 52 API calls 86457->86458 86459 46ba01 86458->86459 86460 40bc70 52 API calls 86459->86460 86461 46ba0a 86460->86461 86462 46ba38 86461->86462 86464 46ba1e 86461->86464 86463 45340c 85 API calls 86462->86463 86465 46ba43 86463->86465 86466 408f40 VariantClear 86464->86466 86467 401b10 52 API calls 86465->86467 86472 46ba26 86466->86472 86468 46ba4f 86467->86468 86469 463980 52 API calls 86468->86469 86470 46ba63 86469->86470 86471 46379b 53 API calls 86470->86471 86473 46ba9b 86471->86473 86472->86204 86474 46bb10 RegCreateKeyExW 86473->86474 86475 46bad7 RegConnectRegistryW 86473->86475 86476 46ba9f 86473->86476 86481 46bb95 86474->86481 86482 46bb4a 86474->86482 86475->86474 86477 46baf0 86475->86477 86479 408f40 VariantClear 86476->86479 86480 403cd0 VariantClear 86477->86480 86479->86472 86480->86476 86483 46be74 RegCloseKey 86481->86483 86485 45340c 85 API calls 86481->86485 86484 403cd0 VariantClear 86482->86484 86483->86472 86486 46be89 RegCloseKey 86483->86486 86487 46bb5d 86484->86487 86488 46bbb0 86485->86488 86486->86472 86491 408f40 VariantClear 86487->86491 86489 4114ab __wcsicoll 58 API calls 86488->86489 86490 46bbb6 86489->86490 86493 46bbc0 86490->86493 86494 46bc0a 86490->86494 86492 46bb74 86491->86492 86492->86472 86495 46bb89 RegCloseKey 86492->86495 86497 45340c 85 API calls 86493->86497 86496 45340c 85 API calls 86494->86496 86495->86472 86498 46bc18 86496->86498 86499 46bbc9 _wcslen 86497->86499 86500 4114ab __wcsicoll 58 API calls 86498->86500 86504 45340c 85 API calls 86499->86504 86501 46bc1e 86500->86501 86502 46bc7d 86501->86502 86503 46bc28 86501->86503 86505 45340c 85 API calls 86502->86505 86506 45340c 85 API calls 86503->86506 86507 46bbe6 86504->86507 86508 46bc8b 86505->86508 86509 46bc31 _wcslen 86506->86509 86510 45340c 85 API calls 86507->86510 86512 4114ab __wcsicoll 58 API calls 86508->86512 86516 45340c 85 API calls 86509->86516 86511 46bbf1 RegSetValueExW 86510->86511 86511->86483 86528 46bc05 86511->86528 86513 46bc91 86512->86513 86514 46bd6c 86513->86514 86515 46bc9c 86513->86515 86517 45340c 85 API calls 86514->86517 87053 4533b1 85 API calls 86515->87053 86519 46bc4e 86516->86519 86521 46bd7d 86517->86521 86523 45340c 85 API calls 86519->86523 86520 403cd0 VariantClear 86524 46be63 86520->86524 86525 4114ab __wcsicoll 58 API calls 86521->86525 86522 46bca8 86526 4115d7 52 API calls 86522->86526 86527 46bc58 RegSetValueExW 86523->86527 86529 408f40 VariantClear 86524->86529 86530 46bd83 86525->86530 86531 46bcc7 86526->86531 86527->86483 86527->86528 86528->86520 86545 46bd51 moneypunct 86529->86545 86533 45340c 85 API calls 86530->86533 86532 45340c 85 API calls 86531->86532 86537 46bcdc 86532->86537 86534 46bdc1 86533->86534 86535 4114ab __wcsicoll 58 API calls 86534->86535 86536 46bdc7 86535->86536 86539 46bdda 86536->86539 87054 443006 57 API calls 86536->87054 86538 45340c 85 API calls 86537->86538 86541 46bd26 RegSetValueExW 86538->86541 86540 45340c 85 API calls 86539->86540 86544 46bd36 86541->86544 86541->86545 86547 403cd0 VariantClear 86544->86547 86545->86483 86556 45ca15 86555->86556 86558 45c9b7 86555->86558 86557 45340c 85 API calls 86556->86557 86559 45ca20 GetShortPathNameW 86557->86559 86558->86556 86562 45c9c7 86558->86562 86560 45c9e7 86559->86560 86561 45ca37 86559->86561 86568 45340c 85 API calls 86560->86568 86563 40e710 53 API calls 86561->86563 86564 45340c 85 API calls 86562->86564 86565 45ca45 86563->86565 86566 45c9d2 86564->86566 86565->86204 86567 410120 53 API calls 86566->86567 86569 45c9df 86567->86569 86570 45ca02 86568->86570 86569->86559 86571 40e710 53 API calls 86570->86571 86572 45ca0a 86571->86572 86572->86204 87055 475077 86573->87055 86575 4755c0 86575->86204 86577 453404 86576->86577 86578 4533f8 86576->86578 86580 473ad9 86577->86580 86578->86577 86579 4531b1 85 API calls 86578->86579 86579->86577 86581 408f40 VariantClear 86580->86581 86582 473ae7 86581->86582 86583 4115d7 52 API calls 86582->86583 86584 473aee 86583->86584 86589 470cc8 86584->86589 86586 473b09 86586->86243 86587->86238 86588->86233 86606 4536f7 86589->86606 86591 470ceb 86591->86586 86592 401c90 52 API calls 86594 470cd8 86592->86594 86593 470d31 86595 470d43 86593->86595 86624 401c90 86593->86624 86594->86591 86594->86592 86594->86593 86596 4115d7 52 API calls 86595->86596 86598 470d71 86596->86598 86609 45efe4 86598->86609 86600 470dd1 86601 470dd7 86600->86601 86602 4115d7 52 API calls 86600->86602 86601->86586 86603 470dfe 86602->86603 86604 4115d7 52 API calls 86603->86604 86605 470e18 setSBUpLow 86604->86605 86605->86586 86607 4026f0 52 API calls 86606->86607 86608 453705 CharLowerBuffW 86607->86608 86608->86594 86610 40bc70 52 API calls 86609->86610 86611 45f014 86610->86611 86612 40bc70 52 API calls 86611->86612 86613 45f01d 86612->86613 86614 40bc70 52 API calls 86613->86614 86615 45f026 86614->86615 86616 402160 52 API calls 86615->86616 86617 45f3c5 86615->86617 86618 403020 52 API calls 86615->86618 86619 413238 GetStringTypeW 86615->86619 86621 413190 47 API calls 86615->86621 86622 45efe4 53 API calls 86615->86622 86623 40e0a0 52 API calls 86615->86623 86627 4131fc GetStringTypeW wcstoxq 86615->86627 86616->86615 86617->86600 86618->86615 86619->86615 86621->86615 86622->86615 86623->86615 86625 4026f0 52 API calls 86624->86625 86626 401c97 86625->86626 86626->86595 86627->86615 86629 453439 86628->86629 86630 453419 86628->86630 86629->86256 86631 45342f 86630->86631 86632 4531b1 85 API calls 86630->86632 86631->86256 86633 453425 86632->86633 86633->86256 86635 411523 86634->86635 86636 4114ba 86634->86636 86656 4113a8 58 API calls 3 library calls 86635->86656 86641 4114d1 86636->86641 86654 417f77 46 API calls __getptd_noexit 86636->86654 86639 4114c6 86655 417f25 10 API calls __wsplitpath_helper 86639->86655 86641->86256 86642->86263 86644 408f40 VariantClear 86643->86644 86645 40e71b 86644->86645 86646 4115d7 52 API calls 86645->86646 86647 40e729 86646->86647 86648 40e734 86647->86648 86650 426bdc 86647->86650 86649 426be7 86648->86649 86652 401b10 52 API calls 86648->86652 86650->86649 86651 40bc70 52 API calls 86650->86651 86651->86649 86653 40e743 86652->86653 86653->86269 86654->86639 86655->86641 86656->86641 86660 4684dc 86657->86660 86659 468887 86659->86283 86736 45360e 86660->86736 86662 468507 86663 468527 86662->86663 86664 46850d 86662->86664 86667 468582 86663->86667 86668 468562 86663->86668 86665 408f40 VariantClear 86664->86665 86666 468512 86665->86666 86666->86659 86669 468586 86667->86669 86670 4685a2 86667->86670 86671 408f40 VariantClear 86668->86671 86756 46822a 90 API calls 2 library calls 86669->86756 86673 468644 86670->86673 86678 468623 86670->86678 86679 4685bf 86670->86679 86674 468567 86671->86674 86676 468675 86673->86676 86677 46864b 86673->86677 86674->86659 86675 468599 86675->86659 86682 4686e8 86676->86682 86683 468679 86676->86683 86680 468658 86677->86680 86757 44b3ac 57 API calls 86677->86757 86678->86673 86684 468627 86678->86684 86679->86673 86681 4685c7 86679->86681 86686 408f40 VariantClear 86680->86686 86741 4680ed 86681->86741 86688 46880e 86682->86688 86692 4687f2 86682->86692 86693 4686fc 86682->86693 86694 46874a 86682->86694 86695 468799 86682->86695 86689 4686b9 86683->86689 86714 468681 86683->86714 86690 453132 53 API calls 86684->86690 86691 468661 86686->86691 86688->86659 86698 408f40 VariantClear 86689->86698 86696 468630 _memmove 86690->86696 86691->86659 86701 4687ff 86692->86701 86761 443006 57 API calls 86692->86761 86700 468709 86693->86700 86758 443006 57 API calls 86693->86758 86699 468757 86694->86699 86759 443006 57 API calls 86694->86759 86697 4687a6 86695->86697 86760 443006 57 API calls 86695->86760 86696->86659 86703 4687cf 86697->86703 86704 4687af 86697->86704 86705 4686d1 86698->86705 86712 468761 86699->86712 86713 46877d 86699->86713 86708 468712 86700->86708 86709 46872e 86700->86709 86710 408f40 VariantClear 86701->86710 86718 408f40 VariantClear 86703->86718 86717 408f40 VariantClear 86704->86717 86705->86659 86719 408f40 VariantClear 86708->86719 86720 408f40 VariantClear 86709->86720 86710->86688 86721 408f40 VariantClear 86712->86721 86723 408f40 VariantClear 86713->86723 86714->86688 86715 408f40 VariantClear 86714->86715 86716 4686a2 86715->86716 86716->86659 86724 4687b8 86717->86724 86725 4687db 86718->86725 86726 46871a 86719->86726 86727 468736 86720->86727 86728 468769 86721->86728 86722 4685d0 86729 4680ed 55 API calls 86722->86729 86730 468785 86723->86730 86724->86659 86725->86659 86726->86659 86727->86659 86728->86659 86731 4685ec _memmove 86729->86731 86730->86659 86732 4680ed 55 API calls 86731->86732 86733 468604 86732->86733 86745 453132 86733->86745 86735 46860f _memmove 86735->86659 86737 453623 86736->86737 86738 45340c 85 API calls 86737->86738 86739 45365a 86737->86739 86740 4114ab __wcsicoll 58 API calls 86737->86740 86738->86737 86739->86662 86740->86737 86742 468100 86741->86742 86743 4680fa 86741->86743 86742->86722 86762 467ac4 86743->86762 86746 408f40 VariantClear 86745->86746 86747 453142 86746->86747 86748 4115d7 52 API calls 86747->86748 86749 453149 86748->86749 86750 453154 86749->86750 86751 453188 86749->86751 86753 4115d7 52 API calls 86750->86753 86752 4115d7 52 API calls 86751->86752 86754 45318f 86752->86754 86755 45315e setSBUpLow 86753->86755 86754->86735 86755->86735 86756->86675 86757->86680 86758->86700 86759->86699 86760->86697 86761->86701 86763 467bb8 86762->86763 86764 467adc 86762->86764 86763->86742 86765 467c1d 86764->86765 86766 467c16 86764->86766 86767 467b90 86764->86767 86775 467aed 86764->86775 86768 4115d7 52 API calls 86765->86768 86784 40e270 VariantClear moneypunct 86766->86784 86770 4115d7 52 API calls 86767->86770 86780 467b75 _memmove 86768->86780 86770->86780 86771 467b55 86773 4115d7 52 API calls 86771->86773 86772 4115d7 52 API calls 86772->86763 86774 467b5b 86773->86774 86782 442ee0 52 API calls 86774->86782 86777 4115d7 52 API calls 86775->86777 86781 467b28 moneypunct 86775->86781 86777->86781 86778 467b6b 86783 45f645 54 API calls moneypunct 86778->86783 86780->86772 86781->86765 86781->86771 86781->86780 86782->86778 86783->86780 86784->86765 86786 4115d7 52 API calls 86785->86786 86787 4028b3 86786->86787 86788 4115d7 52 API calls 86787->86788 86825 4028c5 moneypunct _memmove 86788->86825 86791 427d62 86794 403350 52 API calls 86791->86794 86792 402bb6 86836 403060 53 API calls 86792->86836 86793 402aeb moneypunct 86798 42802b moneypunct 86793->86798 86828 402780 86793->86828 86802 427d6b 86794->86802 86796 402780 52 API calls 86796->86825 86797 402bca 86799 427f63 86797->86799 86800 402bd4 86797->86800 86842 460879 92 API calls 3 library calls 86799->86842 86804 402780 52 API calls 86800->86804 86801 403350 52 API calls 86801->86825 86808 427f2c 86802->86808 86839 403020 52 API calls _memmove 86802->86839 86806 402bdf 86804->86806 86806->86290 86807 427fd5 86843 460879 92 API calls 3 library calls 86807->86843 86841 460879 92 API calls 3 library calls 86808->86841 86813 427fe4 86823 402780 52 API calls 86813->86823 86814 427fa5 86819 402780 52 API calls 86814->86819 86815 402f00 52 API calls 86815->86825 86816 428000 86844 460879 92 API calls 3 library calls 86816->86844 86818 4026f0 52 API calls 86822 402a85 CharUpperBuffW 86818->86822 86824 402b1e moneypunct 86819->86824 86821 427f48 86821->86824 86822->86825 86823->86821 86824->86290 86825->86791 86825->86792 86825->86793 86825->86796 86825->86801 86825->86807 86825->86808 86825->86814 86825->86815 86825->86816 86825->86818 86826 4115d7 52 API calls 86825->86826 86827 4031b0 63 API calls 86825->86827 86837 402f80 92 API calls _memmove 86825->86837 86838 402280 52 API calls 86825->86838 86840 4013a0 52 API calls 86825->86840 86826->86825 86827->86825 86829 402790 moneypunct _memmove 86828->86829 86830 402827 86828->86830 86831 4115d7 52 API calls 86829->86831 86833 4115d7 52 API calls 86830->86833 86832 402797 86831->86832 86834 4027bd 86832->86834 86835 4115d7 52 API calls 86832->86835 86833->86829 86834->86824 86835->86834 86836->86797 86837->86825 86838->86825 86839->86802 86840->86825 86841->86821 86842->86821 86843->86813 86844->86824 86846 443d51 86845->86846 86847 443d33 _wcslen 86845->86847 86853 433ee0 CreateToolhelp32Snapshot Process32FirstW 86846->86853 86847->86846 86850 443d41 86847->86850 86849 443d59 86849->86305 86860 433d9e 63 API calls 4 library calls 86850->86860 86852 443d49 86852->86305 86861 433d5f 86853->86861 86855 433fbe CloseHandle 86855->86849 86856 433f30 Process32NextW 86856->86855 86859 433f1f _wcscat 86856->86859 86857 413a0e __wsplitpath 46 API calls 86857->86859 86858 4114ab __wcsicoll 58 API calls 86858->86859 86859->86855 86859->86856 86859->86857 86859->86858 86860->86852 86862 433d8b 86861->86862 86863 433d6e 86861->86863 86869 41319b 57 API calls __wcstoi64 86862->86869 86863->86862 86867 433d98 86863->86867 86868 4131fc GetStringTypeW wcstoxq 86863->86868 86866 433d91 86866->86859 86867->86859 86868->86863 86869->86866 86891 410160 86870->86891 86872 41012f GetFullPathNameW 86873 410147 moneypunct 86872->86873 86873->86317 86875 4339aa 86874->86875 86875->86328 86875->86329 86877 431b19 FindClose 86876->86877 86882 431ab3 86876->86882 86878 431b45 FindFirstFileW 86877->86878 86879 431b28 86877->86879 86880 431b58 86878->86880 86881 431bcc FindClose 86878->86881 86879->86333 86885 431bbc FindNextFileW 86880->86885 86888 431b91 SetCurrentDirectoryW 86880->86888 86889 431bb5 SetCurrentDirectoryW 86880->86889 86890 431bda FindClose 86880->86890 86881->86333 86883 431b09 FindNextFileW 86882->86883 86884 431acc 86882->86884 86883->86877 86883->86882 86884->86883 86886 431ae2 GetFileAttributesW SetFileAttributesW 86884->86886 86885->86880 86885->86881 86886->86884 86887 431b33 FindClose 86886->86887 86887->86333 86888->86880 86889->86885 86890->86333 86892 410167 _wcslen 86891->86892 86893 4115d7 52 API calls 86892->86893 86894 41017e _wcscpy 86893->86894 86894->86872 86896 408e80 VariantClear 86895->86896 86897 471f70 86896->86897 86898 471f76 86897->86898 86899 471f95 86897->86899 86900 4533eb 85 API calls 86898->86900 86901 402160 52 API calls 86899->86901 86902 471f82 86900->86902 86903 471fa5 86901->86903 86904 40e0a0 52 API calls 86902->86904 86903->86342 86905 471f8e 86904->86905 86905->86342 86907 46f3d5 86906->86907 86908 46f3e6 86907->86908 86911 46f427 86907->86911 86977 44b3ac 57 API calls 86908->86977 86910 46f3eb IsWindow 86912 46f41e 86910->86912 86913 46f3fb 86910->86913 86911->86912 86914 4533eb 85 API calls 86911->86914 86912->86344 86978 44cdaf 52 API calls 86913->86978 86916 46f459 86914->86916 86926 46ed8e 86916->86926 86917 46f408 86979 436299 52 API calls 2 library calls 86917->86979 86920 46f466 86920->86344 86921 46f412 86921->86344 86994 436327 SendMessageTimeoutW 86922->86994 86924 436466 86924->86350 86924->86351 86925->86356 86927 46eda2 86926->86927 86928 40e0a0 52 API calls 86927->86928 86929 46edd0 86928->86929 86930 40e0a0 52 API calls 86929->86930 86931 46ede0 86930->86931 86932 402160 52 API calls 86931->86932 86933 46edf4 86932->86933 86934 40bc70 52 API calls 86933->86934 86935 46ee22 86934->86935 86936 40bc70 52 API calls 86935->86936 86937 46ee2b 86936->86937 86938 40bc70 52 API calls 86937->86938 86939 46ee34 86938->86939 86942 46ee5a 86939->86942 86980 469296 64 API calls 2 library calls 86939->86980 86941 46eec5 86943 401c90 52 API calls 86941->86943 86942->86941 86945 46ee79 GetForegroundWindow 86942->86945 86944 46eed0 86943->86944 86946 401c90 52 API calls 86944->86946 86949 46f2f9 86944->86949 86981 44cdaf 52 API calls 86945->86981 86974 46eee8 86946->86974 86948 46ee86 86982 436299 52 API calls 2 library calls 86948->86982 86950 46f315 86949->86950 86952 40e0a0 52 API calls 86949->86952 86953 46f335 86950->86953 86986 410bc0 53 API calls 86950->86986 86952->86950 86956 46f34a 86953->86956 86987 410bc0 53 API calls 86953->86987 86957 46f356 GetDesktopWindow EnumChildWindows 86956->86957 86958 46f365 EnumWindows 86956->86958 86960 46f36b 86957->86960 86958->86960 86990 46130d 86958->86990 86988 4457df 52 API calls moneypunct 86960->86988 86962 46ee9c 86962->86920 86963 46f24b 86966 46f265 GetForegroundWindow 86963->86966 86973 46efb8 86963->86973 86964 46f379 86967 46f395 86964->86967 86989 44cdaf 52 API calls 86964->86989 86968 46f26c 86966->86968 86967->86920 86969 46f292 IsWindow 86968->86969 86985 44cdaf 52 API calls 86968->86985 86969->86968 86969->86973 86972 401070 46 API calls 86972->86974 86973->86920 86974->86949 86974->86963 86974->86968 86974->86972 86974->86973 86975 413190 47 API calls 86974->86975 86976 40e0a0 52 API calls 86974->86976 86983 461a5b 53 API calls 86974->86983 86984 46906d 54 API calls 86974->86984 86975->86974 86976->86974 86977->86910 86978->86917 86979->86921 86980->86942 86981->86948 86982->86962 86983->86974 86984->86974 86985->86968 86986->86953 86987->86956 86988->86964 86989->86967 86993 461014 64 API calls 2 library calls 86990->86993 86992 46131d 86993->86992 86994->86924 86996 4684dc 94 API calls 86995->86996 86997 468867 86996->86997 86997->86372 86999 402160 52 API calls 86998->86999 87000 463993 86999->87000 87001 402160 52 API calls 87000->87001 87002 46399b 87001->87002 87003 402160 52 API calls 87002->87003 87004 4639a3 87003->87004 87005 463a09 87004->87005 87006 401c90 52 API calls 87004->87006 87007 402160 52 API calls 87005->87007 87008 4639b3 87006->87008 87011 463a07 87007->87011 87008->87005 87009 401c90 52 API calls 87008->87009 87010 4639c3 87009->87010 87010->87005 87013 4639c9 87010->87013 87031 461465 87011->87031 87014 40c600 52 API calls 87013->87014 87019 4639d4 87014->87019 87015 463a3e 87016 461465 52 API calls 87015->87016 87017 463a54 87016->87017 87044 40e680 87017->87044 87021 461465 52 API calls 87019->87021 87020 463a5e 87020->86396 87022 4639f9 87021->87022 87023 40c600 52 API calls 87022->87023 87023->87011 87051 410bc0 53 API calls 87024->87051 87026 4637af 87052 463763 52 API calls 87026->87052 87028 4637c4 87029 40e680 52 API calls 87028->87029 87030 4637e5 87028->87030 87029->87030 87030->86398 87032 4614cf 87031->87032 87033 461478 87031->87033 87034 40c600 52 API calls 87032->87034 87033->87032 87036 461482 87033->87036 87035 4614da 87034->87035 87035->87015 87037 4614e1 87036->87037 87038 46149c 87036->87038 87050 403bd0 52 API calls moneypunct 87037->87050 87049 4013a0 52 API calls 87038->87049 87041 4614a6 87043 4115d7 52 API calls 87041->87043 87042 4614c8 _memmove 87042->87015 87043->87042 87045 40e687 87044->87045 87046 427616 87045->87046 87047 40c600 52 API calls 87045->87047 87048 40e69b 87047->87048 87048->87020 87049->87041 87050->87042 87051->87026 87052->87028 87053->86522 87054->86539 87056 4533eb 85 API calls 87055->87056 87057 4750b8 87056->87057 87058 4750ee 87057->87058 87059 475129 87057->87059 87061 408f40 VariantClear 87058->87061 87106 4646e0 87059->87106 87066 4750f5 87061->87066 87062 47515e 87063 475162 87062->87063 87099 47518e 87062->87099 87064 408f40 VariantClear 87063->87064 87093 475169 87064->87093 87065 475357 87067 475365 87065->87067 87068 4754ea 87065->87068 87066->86575 87136 44b3ac 57 API calls 87067->87136 87141 464812 92 API calls 87068->87141 87072 4754fc 87073 475374 87072->87073 87075 475508 87072->87075 87119 430d31 87073->87119 87074 4533eb 85 API calls 87074->87099 87076 408f40 VariantClear 87075->87076 87079 47550f 87076->87079 87079->87093 87080 475388 87126 4577e9 87080->87126 87082 47539e 87085 4753d4 87082->87085 87086 4753b8 87082->87086 87083 475480 87084 408f40 VariantClear 87083->87084 87084->87093 87088 40e830 53 API calls 87085->87088 87137 45e737 90 API calls 3 library calls 87086->87137 87090 4753e3 87088->87090 87089 4753c5 GetCurrentProcess TerminateProcess 87089->87085 87104 475406 87090->87104 87138 40cf00 53 API calls 87090->87138 87091 4754b5 87092 408f40 VariantClear 87091->87092 87092->87093 87093->86575 87095 475556 87095->87093 87100 47556e FreeLibrary 87095->87100 87096 4753f8 87139 46c43e 106 API calls 2 library calls 87096->87139 87099->87065 87099->87074 87099->87083 87099->87091 87099->87099 87134 436299 52 API calls 2 library calls 87099->87134 87135 463ad5 64 API calls __wcsicoll 87099->87135 87100->87093 87102 408e80 VariantClear 87102->87104 87104->87095 87104->87102 87105 408f40 VariantClear 87104->87105 87140 40cf00 53 API calls 87104->87140 87142 44b3ac 57 API calls 87104->87142 87143 46c43e 106 API calls 2 library calls 87104->87143 87105->87104 87107 4536f7 53 API calls 87106->87107 87108 4646fc 87107->87108 87144 4426cd 59 API calls _wcslen 87108->87144 87110 464711 87112 40bc70 52 API calls 87110->87112 87118 46474b 87110->87118 87113 46472c 87112->87113 87114 461465 52 API calls 87113->87114 87115 464741 87114->87115 87116 40c600 52 API calls 87115->87116 87116->87118 87117 464793 87117->87062 87118->87117 87145 463ad5 64 API calls __wcsicoll 87118->87145 87120 430db2 87119->87120 87121 430d54 87119->87121 87120->87080 87122 4115d7 52 API calls 87121->87122 87125 430d74 87122->87125 87123 430da9 87123->87080 87124 4115d7 52 API calls 87124->87125 87125->87123 87125->87124 87127 457a84 87126->87127 87133 45780c _strcat moneypunct _wcslen _wcscpy 87126->87133 87127->87082 87128 45340c 85 API calls 87128->87133 87129 443006 57 API calls 87129->87133 87131 4135bb 46 API calls _malloc 87131->87133 87133->87127 87133->87128 87133->87129 87133->87131 87146 40f6f0 87133->87146 87154 44b3ac 57 API calls 87133->87154 87134->87099 87135->87099 87136->87073 87137->87089 87138->87096 87139->87104 87140->87104 87141->87072 87142->87104 87143->87104 87144->87110 87145->87117 87147 425de2 87146->87147 87148 40f6fc _wcslen 87146->87148 87147->87133 87149 40f710 WideCharToMultiByte 87148->87149 87150 40f756 87149->87150 87151 40f728 87149->87151 87150->87133 87152 4115d7 52 API calls 87151->87152 87153 40f735 WideCharToMultiByte 87152->87153 87153->87133 87154->87133 87156 42c5fe 87155->87156 87170 4091c6 87155->87170 87157 40bc70 52 API calls 87156->87157 87156->87170 87158 42c64e InterlockedIncrement 87157->87158 87159 42c665 87158->87159 87163 42c697 87158->87163 87162 42c672 InterlockedDecrement Sleep InterlockedIncrement 87159->87162 87159->87163 87160 42c737 InterlockedDecrement 87161 42c74a 87160->87161 87164 408f40 VariantClear 87161->87164 87162->87159 87162->87163 87163->87160 87165 408e80 VariantClear 87163->87165 87185 42c731 87163->87185 87166 42c752 87164->87166 87167 42c6cf 87165->87167 87326 410c60 VariantClear moneypunct 87166->87326 87169 45340c 85 API calls 87167->87169 87171 42c6db 87169->87171 87170->86095 87172 402160 52 API calls 87171->87172 87173 42c6e5 87172->87173 87174 45340c 85 API calls 87173->87174 87175 42c6f1 87174->87175 87324 40d200 52 API calls 2 library calls 87175->87324 87177 42c6fb 87178 465124 53 API calls 87177->87178 87179 42c715 87178->87179 87180 42c76a 87179->87180 87181 42c719 87179->87181 87182 401b10 52 API calls 87180->87182 87325 46fe32 VariantClear 87181->87325 87184 42c77e 87182->87184 87186 401980 53 API calls 87184->87186 87185->87160 87192 42c796 87186->87192 87187 42c812 87327 46fe32 VariantClear 87187->87327 87189 42c82a InterlockedDecrement 87328 46ff07 54 API calls 87189->87328 87191 42c864 87329 45e737 90 API calls 3 library calls 87191->87329 87192->87187 87192->87191 87195 40ba10 52 API calls 87192->87195 87193 42c9ec 87196 47d33e 364 API calls 87193->87196 87195->87192 87197 42c9fe 87196->87197 87331 46feb1 VariantClear VariantClear 87197->87331 87199 408f40 VariantClear 87209 42c849 87199->87209 87200 42ca08 87201 401b10 52 API calls 87200->87201 87204 42ca15 87201->87204 87202 408f40 VariantClear 87205 42c891 87202->87205 87203 402780 52 API calls 87203->87209 87207 40c2c0 52 API calls 87204->87207 87330 410c60 VariantClear moneypunct 87205->87330 87206 401980 53 API calls 87206->87209 87210 42c874 87207->87210 87209->87193 87209->87199 87209->87203 87209->87206 87211 40a780 364 API calls 87209->87211 87210->87202 87212 42ca59 87210->87212 87211->87209 87212->87212 87214 40afc4 87213->87214 87215 40b156 87213->87215 87216 40afd5 87214->87216 87217 42d1e3 87214->87217 87332 45e737 90 API calls 3 library calls 87215->87332 87220 40a780 368 API calls 87216->87220 87238 40b11a moneypunct 87216->87238 87333 45e737 90 API calls 3 library calls 87217->87333 87223 40b00a 87220->87223 87221 42d1f8 87226 408f40 VariantClear 87221->87226 87222 40b143 87222->86095 87223->87221 87227 40b012 87223->87227 87225 42d4db 87225->87225 87226->87222 87228 40b04a 87227->87228 87229 42d231 VariantClear 87227->87229 87231 40b094 moneypunct 87227->87231 87236 40b05c moneypunct 87228->87236 87334 40e270 VariantClear moneypunct 87228->87334 87229->87236 87230 40b108 87230->87238 87335 40e270 VariantClear moneypunct 87230->87335 87231->87230 87234 42d425 moneypunct 87231->87234 87232 42d45a VariantClear 87232->87238 87234->87232 87234->87238 87236->87231 87237 4115d7 52 API calls 87236->87237 87237->87231 87238->87222 87336 45e737 90 API calls 3 library calls 87238->87336 87240 408fff 87239->87240 87251 40900d 87239->87251 87337 403ea0 52 API calls __cinit 87240->87337 87243 42c3f6 87339 45e737 90 API calls 3 library calls 87243->87339 87245 42c44a 87341 45e737 90 API calls 3 library calls 87245->87341 87246 40a780 370 API calls 87246->87251 87247 42c47b 87342 451b42 61 API calls 87247->87342 87251->87243 87251->87245 87251->87246 87251->87247 87252 42c4cb 87251->87252 87253 42c564 87251->87253 87257 42c548 87251->87257 87258 409112 87251->87258 87261 4090df 87251->87261 87263 42c528 87251->87263 87265 4090ea 87251->87265 87270 4090f2 moneypunct 87251->87270 87338 4534e3 52 API calls 87251->87338 87340 40c4e0 370 API calls 87251->87340 87344 47faae 370 API calls 87252->87344 87254 408f40 VariantClear 87253->87254 87254->87270 87255 42c491 87255->87270 87343 45e737 90 API calls 3 library calls 87255->87343 87347 45e737 90 API calls 3 library calls 87257->87347 87258->87257 87268 40912b 87258->87268 87259 42c4da 87259->87270 87345 45e737 90 API calls 3 library calls 87259->87345 87261->87265 87266 408e80 VariantClear 87261->87266 87346 45e737 90 API calls 3 library calls 87263->87346 87269 408f40 VariantClear 87265->87269 87266->87265 87268->87270 87271 403e10 53 API calls 87268->87271 87269->87270 87270->86095 87272 40914b 87271->87272 87273 408f40 VariantClear 87272->87273 87273->87270 87275 40d15f 87274->87275 87277 425c87 87274->87277 87275->86095 87276 425cc7 87277->87276 87278 425ca1 TranslateAcceleratorW 87277->87278 87278->87275 87280 42602f 87279->87280 87283 40d17f 87279->87283 87280->86095 87281 42608e IsDialogMessageW 87282 40d18c 87281->87282 87281->87283 87282->86095 87283->87281 87283->87282 87348 430c46 GetClassLongW 87283->87348 87286 401b10 52 API calls 87285->87286 87287 465136 87286->87287 87349 40f310 53 API calls 87287->87349 87289 465143 87289->86095 87290->86095 87291->86044 87292->86050 87293->86095 87294->86101 87296 47d365 87295->87296 87297 47d36b 87295->87297 87350 46ff07 54 API calls 87296->87350 87351 473a07 87297->87351 87301 4091e0 370 API calls 87302 47d38a 87301->87302 87303 47d3bd 87302->87303 87304 47d3ab 87302->87304 87307 47d3bb 87302->87307 87306 408f40 VariantClear 87303->87306 87312 408e80 VariantClear 87304->87312 87306->87307 87366 473950 53 API calls 87307->87366 87308 47d3de 87309 47d3ee 87308->87309 87367 46feb1 VariantClear VariantClear 87308->87367 87311 47d403 87309->87311 87368 40c790 VariantClear moneypunct 87309->87368 87311->86101 87312->87307 87314->86101 87315->86101 87317 40c638 87316->87317 87317->86101 87318->86101 87319->86101 87320->86101 87321->86101 87322->86095 87323->86041 87324->87177 87325->87185 87326->87170 87327->87189 87328->87209 87329->87210 87330->87170 87331->87200 87332->87217 87333->87221 87334->87236 87335->87238 87336->87225 87337->87251 87338->87251 87339->87270 87340->87251 87341->87270 87342->87255 87343->87270 87344->87259 87345->87270 87346->87270 87347->87253 87348->87283 87349->87289 87350->87297 87352 4115d7 52 API calls 87351->87352 87353 473a17 87352->87353 87354 473a24 87353->87354 87369 4526ec 52 API calls 87353->87369 87356 408e80 VariantClear 87354->87356 87357 473a44 87356->87357 87358 40e0a0 52 API calls 87357->87358 87359 473a53 87358->87359 87360 40e0a0 52 API calls 87359->87360 87361 473a8b 87360->87361 87370 40e310 87361->87370 87363 473ac5 87377 44ccd4 87363->87377 87366->87308 87367->87309 87368->87309 87369->87354 87371 428a17 87370->87371 87372 40e31d 87370->87372 87382 47390f VariantClear 87371->87382 87374 4115d7 52 API calls 87372->87374 87376 40e325 87374->87376 87375 428a21 87375->87363 87376->87363 87378 408f40 VariantClear 87377->87378 87379 44cce4 87378->87379 87380 408f40 VariantClear 87379->87380 87381 44cceb 87380->87381 87381->87301 87382->87375 87383->86111 87384->86131 87385->86131 87386->86131 87387->86122 87388->86131 87389->86131 87390 40ad09 87391 40bc10 53 API calls 87390->87391 87392 40ad1f 87391->87392 87394 40ad40 87392->87394 87397 40c1f0 87392->87397 87431 44b92d VariantClear 87394->87431 87396 42bc5b 87398 40c2c0 52 API calls 87397->87398 87399 40c21f 87398->87399 87400 42965b 87399->87400 87401 40c22a 87399->87401 87433 45e737 90 API calls 3 library calls 87400->87433 87403 40c232 87401->87403 87432 40c4e0 370 API calls 87401->87432 87404 40c23e 87403->87404 87409 429673 87403->87409 87406 40c256 87404->87406 87407 4296c7 87404->87407 87408 408e80 VariantClear 87406->87408 87436 45e737 90 API calls 3 library calls 87407->87436 87415 40c25f 87408->87415 87434 47e250 370 API calls 87409->87434 87412 42969a 87413 40c27c 87412->87413 87435 45e737 90 API calls 3 library calls 87412->87435 87413->87394 87415->87413 87416 429721 87415->87416 87437 457f66 87 API calls __write_nolock 87415->87437 87417 429753 87416->87417 87438 472f47 127 API calls 87416->87438 87421 408e80 VariantClear 87417->87421 87420 429708 87423 45340c 85 API calls 87420->87423 87424 42975f 87421->87424 87422 429734 87426 45340c 85 API calls 87422->87426 87427 42970e _wcslen 87423->87427 87425 408f40 VariantClear 87424->87425 87425->87413 87429 42973d _wcslen 87426->87429 87427->87416 87428 408e80 VariantClear 87427->87428 87428->87416 87429->87417 87430 408e80 VariantClear 87429->87430 87430->87417 87431->87396 87432->87403 87433->87409 87434->87412 87435->87413 87436->87413 87437->87420 87438->87422 87439 425b2b 87444 40f000 87439->87444 87443 425b3a 87445 4115d7 52 API calls 87444->87445 87446 40f007 87445->87446 87447 4276ea 87446->87447 87453 40f030 87446->87453 87452 41130a 51 API calls __cinit 87452->87443 87454 40f039 87453->87454 87455 40f01a 87453->87455 87483 41130a 51 API calls __cinit 87454->87483 87457 40e500 87455->87457 87458 40bc70 52 API calls 87457->87458 87459 40e515 GetVersionExW 87458->87459 87460 402160 52 API calls 87459->87460 87461 40e557 87460->87461 87484 40e660 87461->87484 87464 40e680 52 API calls 87466 40e566 87464->87466 87467 427674 87466->87467 87489 40ef60 87466->87489 87471 4276c6 GetSystemInfo 87467->87471 87469 40e5e0 87473 4276d5 GetSystemInfo 87469->87473 87493 40efd0 87469->87493 87470 40e5cd GetCurrentProcess 87500 40ef20 LoadLibraryA GetProcAddress 87470->87500 87471->87473 87476 40e629 87497 40ef90 87476->87497 87479 40e641 FreeLibrary 87480 40e644 87479->87480 87481 40e653 FreeLibrary 87480->87481 87482 40e656 87480->87482 87481->87482 87482->87452 87483->87455 87485 40e667 87484->87485 87486 42761d 87485->87486 87487 40c600 52 API calls 87485->87487 87488 40e55c 87487->87488 87488->87464 87490 40e5c8 87489->87490 87491 40ef66 LoadLibraryA 87489->87491 87490->87469 87490->87470 87491->87490 87492 40ef77 GetProcAddress 87491->87492 87492->87490 87494 40e620 87493->87494 87495 40efd6 LoadLibraryA 87493->87495 87494->87471 87494->87476 87495->87494 87496 40efe7 GetProcAddress 87495->87496 87496->87494 87501 40efb0 LoadLibraryA GetProcAddress 87497->87501 87499 40e632 GetNativeSystemInfo 87499->87479 87499->87480 87500->87469 87501->87499 87502 425b6f 87507 40dc90 87502->87507 87506 425b7e 87508 40bc70 52 API calls 87507->87508 87509 40dd03 87508->87509 87515 40f210 87509->87515 87512 40dd96 87513 40ddb7 87512->87513 87518 40dc00 52 API calls 2 library calls 87512->87518 87514 41130a 51 API calls __cinit 87513->87514 87514->87506 87519 40f250 RegOpenKeyExW 87515->87519 87517 40f230 87517->87512 87518->87512 87520 425e17 87519->87520 87521 40f275 RegQueryValueExW 87519->87521 87520->87517 87522 40f2c3 RegCloseKey 87521->87522 87523 40f298 87521->87523 87522->87517 87524 40f2a9 RegCloseKey 87523->87524 87525 425e1d 87523->87525 87524->87517 87526 416454 87563 416c70 87526->87563 87528 416460 GetStartupInfoW 87529 416474 87528->87529 87564 419d5a HeapCreate 87529->87564 87531 4164cd 87532 4164d8 87531->87532 87648 41642b 46 API calls 3 library calls 87531->87648 87565 417c20 GetModuleHandleW 87532->87565 87535 4164de 87536 4164e9 __RTC_Initialize 87535->87536 87649 41642b 46 API calls 3 library calls 87535->87649 87584 41aaa1 GetStartupInfoW 87536->87584 87540 416503 GetCommandLineW 87597 41f584 GetEnvironmentStringsW 87540->87597 87543 416513 87603 41f4d6 GetModuleFileNameW 87543->87603 87546 41651d 87547 416528 87546->87547 87651 411924 46 API calls 3 library calls 87546->87651 87607 41f2a4 87547->87607 87550 41652e 87551 416539 87550->87551 87652 411924 46 API calls 3 library calls 87550->87652 87621 411703 87551->87621 87554 416541 87556 41654c __wwincmdln 87554->87556 87653 411924 46 API calls 3 library calls 87554->87653 87625 40d6b0 87556->87625 87563->87528 87564->87531 87566 417c34 87565->87566 87567 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 87565->87567 87656 4178ff 49 API calls _free 87566->87656 87569 417c87 TlsAlloc 87567->87569 87572 417cd5 TlsSetValue 87569->87572 87573 417d96 87569->87573 87570 417c39 87570->87535 87572->87573 87574 417ce6 __init_pointers 87572->87574 87573->87535 87657 418151 InitializeCriticalSectionAndSpinCount 87574->87657 87576 417d91 87665 4178ff 49 API calls _free 87576->87665 87578 417d2a 87578->87576 87658 416b49 87578->87658 87581 417d76 87664 41793c 46 API calls 4 library calls 87581->87664 87583 417d7e GetCurrentThreadId 87583->87573 87585 416b49 __calloc_crt 46 API calls 87584->87585 87596 41aabf 87585->87596 87586 41ac6a GetStdHandle 87592 41ac34 87586->87592 87587 416b49 __calloc_crt 46 API calls 87587->87596 87588 41acce SetHandleCount 87591 4164f7 87588->87591 87589 41ac7c GetFileType 87589->87592 87590 41abb4 87590->87592 87593 41abe0 GetFileType 87590->87593 87594 41abeb InitializeCriticalSectionAndSpinCount 87590->87594 87591->87540 87650 411924 46 API calls 3 library calls 87591->87650 87592->87586 87592->87588 87592->87589 87595 41aca2 InitializeCriticalSectionAndSpinCount 87592->87595 87593->87590 87593->87594 87594->87590 87594->87591 87595->87591 87595->87592 87596->87587 87596->87590 87596->87591 87596->87592 87596->87596 87598 41f595 87597->87598 87599 41f599 87597->87599 87598->87543 87675 416b04 87599->87675 87601 41f5bb _memmove 87602 41f5c2 FreeEnvironmentStringsW 87601->87602 87602->87543 87605 41f50b _wparse_cmdline 87603->87605 87604 41f54e _wparse_cmdline 87604->87546 87605->87604 87606 416b04 __malloc_crt 46 API calls 87605->87606 87606->87604 87608 41f2bc _wcslen 87607->87608 87612 41f2b4 87607->87612 87609 416b49 __calloc_crt 46 API calls 87608->87609 87614 41f2e0 _wcslen 87609->87614 87610 41f336 87682 413748 87610->87682 87612->87550 87613 416b49 __calloc_crt 46 API calls 87613->87614 87614->87610 87614->87612 87614->87613 87615 41f35c 87614->87615 87618 41f373 87614->87618 87681 41ef12 46 API calls __wsplitpath_helper 87614->87681 87616 413748 _free 46 API calls 87615->87616 87616->87612 87688 417ed3 87618->87688 87620 41f37f 87620->87550 87622 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 87621->87622 87624 411750 __IsNonwritableInCurrentImage 87622->87624 87707 41130a 51 API calls __cinit 87622->87707 87624->87554 87626 42e2f3 87625->87626 87627 40d6cc 87625->87627 87628 408f40 VariantClear 87627->87628 87629 40d707 87628->87629 87708 40ebb0 87629->87708 87632 40d737 87711 411951 87632->87711 87637 40d751 87723 40f4e0 SystemParametersInfoW SystemParametersInfoW 87637->87723 87639 40d75f 87724 40d590 GetCurrentDirectoryW 87639->87724 87648->87532 87649->87536 87656->87570 87657->87578 87660 416b52 87658->87660 87661 416b8f 87660->87661 87662 416b70 Sleep 87660->87662 87666 41f677 87660->87666 87661->87576 87661->87581 87663 416b85 87662->87663 87663->87660 87663->87661 87664->87583 87665->87573 87667 41f683 87666->87667 87671 41f69e _malloc 87666->87671 87668 41f68f 87667->87668 87667->87671 87674 417f77 46 API calls __getptd_noexit 87668->87674 87670 41f6b1 HeapAlloc 87670->87671 87673 41f6d8 87670->87673 87671->87670 87671->87673 87672 41f694 87672->87660 87673->87660 87674->87672 87678 416b0d 87675->87678 87676 4135bb _malloc 45 API calls 87676->87678 87677 416b43 87677->87601 87678->87676 87678->87677 87679 416b24 Sleep 87678->87679 87680 416b39 87679->87680 87680->87677 87680->87678 87681->87614 87683 41377c _free 87682->87683 87684 413753 RtlFreeHeap 87682->87684 87683->87612 87684->87683 87685 413768 87684->87685 87691 417f77 46 API calls __getptd_noexit 87685->87691 87687 41376e GetLastError 87687->87683 87692 417daa 87688->87692 87691->87687 87693 417dc9 setSBUpLow __call_reportfault 87692->87693 87694 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 87693->87694 87697 417eb5 __call_reportfault 87694->87697 87696 417ed1 GetCurrentProcess TerminateProcess 87696->87620 87698 41a208 87697->87698 87699 41a210 87698->87699 87700 41a212 IsDebuggerPresent 87698->87700 87699->87696 87706 41fe19 87700->87706 87703 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 87704 421ff0 __call_reportfault 87703->87704 87705 421ff8 GetCurrentProcess TerminateProcess 87703->87705 87704->87705 87705->87696 87706->87703 87707->87624 87764 40ebd0 87708->87764 87768 4182cb 87711->87768 87713 41195e 87775 4181f2 LeaveCriticalSection 87713->87775 87715 40d748 87716 4119b0 87715->87716 87717 4119d6 87716->87717 87718 4119bc 87716->87718 87717->87637 87718->87717 87810 417f77 46 API calls __getptd_noexit 87718->87810 87720 4119c6 87811 417f25 10 API calls __wsplitpath_helper 87720->87811 87722 4119d1 87722->87637 87723->87639 87812 401f20 87724->87812 87763 40ec00 LoadLibraryA GetProcAddress 87763->87632 87765 40d72e 87764->87765 87766 40ebd6 LoadLibraryA 87764->87766 87765->87632 87765->87763 87766->87765 87767 40ebe7 GetProcAddress 87766->87767 87767->87765 87769 4182e0 87768->87769 87770 4182f3 EnterCriticalSection 87768->87770 87776 418209 87769->87776 87770->87713 87772 4182e6 87772->87770 87803 411924 46 API calls 3 library calls 87772->87803 87775->87715 87777 418215 __write 87776->87777 87778 418225 87777->87778 87779 41823d 87777->87779 87804 418901 46 API calls __NMSG_WRITE 87778->87804 87782 416b04 __malloc_crt 45 API calls 87779->87782 87785 41824b __write 87779->87785 87781 41822a 87805 418752 46 API calls 7 library calls 87781->87805 87784 418256 87782->87784 87787 41825d 87784->87787 87788 41826c 87784->87788 87785->87772 87786 418231 87806 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 87786->87806 87807 417f77 46 API calls __getptd_noexit 87787->87807 87790 4182cb __lock 45 API calls 87788->87790 87792 418273 87790->87792 87794 4182a6 87792->87794 87795 41827b InitializeCriticalSectionAndSpinCount 87792->87795 87798 413748 _free 45 API calls 87794->87798 87796 418297 87795->87796 87797 41828b 87795->87797 87809 4182c2 LeaveCriticalSection _doexit 87796->87809 87799 413748 _free 45 API calls 87797->87799 87798->87796 87801 418291 87799->87801 87808 417f77 46 API calls __getptd_noexit 87801->87808 87804->87781 87805->87786 87807->87785 87808->87796 87809->87785 87810->87720 87811->87722 87923 40e6e0 87812->87923 87816 401f41 GetModuleFileNameW 87941 410100 87816->87941 87924 40bc70 52 API calls 87923->87924 87925 401f31 87924->87925 87926 402560 87925->87926 87927 40256d __write_nolock 87926->87927 87928 402160 52 API calls 87927->87928 87930 402593 87928->87930 87929 401c90 52 API calls 87929->87930 87930->87929 87940 4025bd 87930->87940 87931 4026f0 52 API calls 87931->87940 87932 4026a7 87933 401b10 52 API calls 87932->87933 87938 4026db 87932->87938 87935 4026d1 87933->87935 87934 401b10 52 API calls 87934->87940 87967 40d7c0 52 API calls 2 library calls 87935->87967 87936 401c90 52 API calls 87936->87940 87938->87816 87940->87931 87940->87932 87940->87934 87940->87936 87966 40d7c0 52 API calls 2 library calls 87940->87966 87968 40f760 87941->87968 87966->87940 87967->87938 87969 40f6f0 54 API calls 87968->87969 87970 40f77b _strcat moneypunct 87969->87970 88028 40f850 87970->88028 88030 40f85d setSBUpLow _strlen 88028->88030 88031 40f7ab 88030->88031 88076 414db8 88030->88076 88032 4149c2 88031->88032 88091 414904 88032->88091 88077 414dd6 88076->88077 88078 414deb 88076->88078 88087 417f77 46 API calls __getptd_noexit 88077->88087 88078->88077 88080 414df2 88078->88080 88089 41b91b 79 API calls 11 library calls 88080->88089 88081 414ddb 88088 417f25 10 API calls __wsplitpath_helper 88081->88088 88084 414e18 88087->88081 88089->88084 88094 414910 __write 88091->88094 88092 414923 88094->88092 88096 414951 88094->88096 88725 40b2b9 88728 40ccd0 88725->88728 88727 40b2c4 88768 40cc70 88728->88768 88730 40ccf3 88731 42c3bb 88730->88731 88732 40cd1b 88730->88732 88757 40cd8a moneypunct 88730->88757 88788 45e737 90 API calls 3 library calls 88731->88788 88734 40cdad 88732->88734 88738 40cd30 88732->88738 88740 40ce40 88734->88740 88746 42c3a0 88734->88746 88749 42c31a 88734->88749 88753 40cc70 370 API calls 88734->88753 88758 42c335 88734->88758 88759 42c370 88734->88759 88763 42c343 88734->88763 88735 40cd72 88737 402780 52 API calls 88735->88737 88736 402780 52 API calls 88736->88738 88739 40cd80 88737->88739 88738->88735 88738->88736 88738->88757 88777 40e7d0 370 API calls 88739->88777 88778 40ceb0 53 API calls 88740->88778 88743 40ce53 88744 408f40 VariantClear 88743->88744 88745 40ce5b 88744->88745 88747 408f40 VariantClear 88745->88747 88786 45e737 90 API calls 3 library calls 88746->88786 88750 40ce63 88747->88750 88779 45e737 90 API calls 3 library calls 88749->88779 88750->88727 88752 42c3ad 88787 452670 VariantClear 88752->88787 88753->88734 88754 42c327 88780 452670 VariantClear 88754->88780 88757->88727 88781 452670 VariantClear 88758->88781 88784 45e737 90 API calls 3 library calls 88759->88784 88762 42c392 88785 452670 VariantClear 88762->88785 88782 45e737 90 API calls 3 library calls 88763->88782 88766 42c362 88783 452670 VariantClear 88766->88783 88769 40a780 370 API calls 88768->88769 88770 40cc96 88769->88770 88771 42bd0e 88770->88771 88772 40cc9e 88770->88772 88773 408f40 VariantClear 88771->88773 88775 408f40 VariantClear 88772->88775 88774 42bd16 88773->88774 88774->88730 88776 40ccb8 88775->88776 88776->88730 88777->88757 88778->88743 88779->88754 88780->88757 88781->88757 88782->88766 88783->88757 88784->88762 88785->88757 88786->88752 88787->88757 88788->88757 88789 425b5e 88794 40c7f0 88789->88794 88793 425b6d 88829 40db10 52 API calls 88794->88829 88796 40c82a 88830 410ab0 6 API calls 88796->88830 88798 40c86d 88799 40bc70 52 API calls 88798->88799 88800 40c877 88799->88800 88801 40bc70 52 API calls 88800->88801 88802 40c881 88801->88802 88803 40bc70 52 API calls 88802->88803 88804 40c88b 88803->88804 88805 40bc70 52 API calls 88804->88805 88806 40c8d1 88805->88806 88807 40bc70 52 API calls 88806->88807 88808 40c991 88807->88808 88831 40d2c0 52 API calls 88808->88831 88810 40c99b 88832 40d0d0 53 API calls 88810->88832 88812 40c9c1 88813 40bc70 52 API calls 88812->88813 88814 40c9cb 88813->88814 88815 40e310 53 API calls 88814->88815 88816 40ca28 88815->88816 88817 408f40 VariantClear 88816->88817 88818 40ca30 88817->88818 88819 408f40 VariantClear 88818->88819 88820 40ca38 GetStdHandle 88819->88820 88821 429630 88820->88821 88822 40ca87 88820->88822 88821->88822 88823 429639 88821->88823 88828 41130a 51 API calls __cinit 88822->88828 88833 4432c0 57 API calls 88823->88833 88825 429641 88834 44b6ab CreateThread 88825->88834 88827 42964f CloseHandle 88827->88822 88828->88793 88829->88796 88830->88798 88831->88810 88832->88812 88833->88825 88834->88827 88835 44b5cb 58 API calls 88834->88835
                    APIs
                    • _wcslen.LIBCMT ref: 004096C1
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • _memmove.LIBCMT ref: 0040970C
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                    • _memmove.LIBCMT ref: 00409D96
                    • _memmove.LIBCMT ref: 0040A6C4
                    • _memmove.LIBCMT ref: 004297E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                    • String ID:
                    • API String ID: 2383988440-0
                    • Opcode ID: bfd21b4b1e92771edea278962f2dbbc3774d8200f025394c5b960fb212de638e
                    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                    • Opcode Fuzzy Hash: bfd21b4b1e92771edea278962f2dbbc3774d8200f025394c5b960fb212de638e
                    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

                    Control-flow Graph

                    APIs
                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                    • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
                      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                    Strings
                    • runas, xrefs: 0042E2AD, 0042E2DC
                    • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                    • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                    • API String ID: 2495805114-3383388033
                    • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                    • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
                    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1815 431a86-431ab1 FindFirstFileW 1816 431ab3 1815->1816 1817 431b19-431b26 FindClose 1815->1817 1820 431ab6-431aca call 41313c 1816->1820 1818 431b45-431b56 FindFirstFileW 1817->1818 1819 431b28-431b30 1817->1819 1822 431b58 1818->1822 1823 431bcc-431bd7 FindClose 1818->1823 1826 431b09-431b17 FindNextFileW 1820->1826 1827 431acc-431ae0 call 41313c 1820->1827 1825 431b5e-431b63 1822->1825 1828 431b65-431b79 call 41313c 1825->1828 1829 431bbc-431bca FindNextFileW 1825->1829 1826->1817 1826->1820 1827->1826 1835 431ae2-431b05 GetFileAttributesW SetFileAttributesW 1827->1835 1828->1829 1834 431b7b-431b8f call 41313c 1828->1834 1829->1823 1829->1825 1834->1829 1840 431b91-431bb3 SetCurrentDirectoryW call 431a86 1834->1840 1837 431b33-431b42 FindClose 1835->1837 1838 431b07 1835->1838 1838->1826 1843 431bb5-431bba SetCurrentDirectoryW 1840->1843 1844 431bda-431be5 FindClose 1840->1844 1843->1829
                    APIs
                    • FindFirstFileW.KERNELBASE(?,?), ref: 00431AAA
                    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                    • FindClose.KERNEL32(00000000), ref: 00431B20
                    • FindClose.KERNEL32(00000000), ref: 00431B34
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                    • FindClose.KERNEL32(00000000), ref: 00431BCD
                    • FindClose.KERNEL32(00000000), ref: 00431BDB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                    • String ID: *.*
                    • API String ID: 1409584000-438819550
                    • Opcode ID: 0aaf05b22cc0e34d801930328c55384c80993e6ce57cec7c7a9e6926fcba0ef0
                    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                    • Opcode Fuzzy Hash: 0aaf05b22cc0e34d801930328c55384c80993e6ce57cec7c7a9e6926fcba0ef0
                    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2551 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 2560 40e582-40e583 2551->2560 2561 427674-427679 2551->2561 2564 40e585-40e596 2560->2564 2565 40e5ba-40e5cb call 40ef60 2560->2565 2562 427683-427686 2561->2562 2563 42767b-427681 2561->2563 2567 427693-427696 2562->2567 2568 427688-427691 2562->2568 2566 4276b4-4276be 2563->2566 2569 427625-427629 2564->2569 2570 40e59c-40e59f 2564->2570 2582 40e5ec-40e60c 2565->2582 2583 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2565->2583 2584 4276c6-4276ca GetSystemInfo 2566->2584 2567->2566 2574 427698-4276a8 2567->2574 2568->2566 2576 427636-427640 2569->2576 2577 42762b-427631 2569->2577 2572 40e5a5-40e5ae 2570->2572 2573 427654-427657 2570->2573 2578 40e5b4 2572->2578 2579 427645-42764f 2572->2579 2573->2565 2585 42765d-42766f 2573->2585 2580 4276b0 2574->2580 2581 4276aa-4276ae 2574->2581 2576->2565 2577->2565 2578->2565 2579->2565 2580->2566 2581->2566 2587 40e612-40e623 call 40efd0 2582->2587 2588 4276d5-4276df GetSystemInfo 2582->2588 2583->2582 2595 40e5e8 2583->2595 2584->2588 2585->2565 2587->2584 2592 40e629-40e63f call 40ef90 GetNativeSystemInfo 2587->2592 2597 40e641-40e642 FreeLibrary 2592->2597 2598 40e644-40e651 2592->2598 2595->2582 2597->2598 2599 40e653-40e654 FreeLibrary 2598->2599 2600 40e656-40e65d 2598->2600 2599->2600
                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 0040E52A
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                    • FreeLibrary.KERNEL32(?), ref: 0040E642
                    • FreeLibrary.KERNEL32(?), ref: 0040E654
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                    • String ID: 0SH
                    • API String ID: 3363477735-851180471
                    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                    • __wsplitpath.LIBCMT ref: 00475644
                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                    • _wcscat.LIBCMT ref: 00475657
                    • __wcsicoll.LIBCMT ref: 0047567B
                    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                    • CloseHandle.KERNELBASE(00000000), ref: 004756BA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                    • String ID:
                    • API String ID: 2547909840-0
                    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                    APIs
                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: IsThemeActive$uxtheme.dll
                    • API String ID: 2574300362-3542929980
                    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                    • Sleep.KERNELBASE(0000000A,?), ref: 004094D1
                    • TranslateMessage.USER32(?), ref: 00409556
                    • DispatchMessageW.USER32(?), ref: 00409561
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Message$Peek$DispatchSleepTranslate
                    • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                    • API String ID: 1762048999-758534266
                    • Opcode ID: 5712b87c49c915216811b480e69fefffe8f71317a227eb84c10c238b40fcc816
                    • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                    • Opcode Fuzzy Hash: 5712b87c49c915216811b480e69fefffe8f71317a227eb84c10c238b40fcc816
                    • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 330 46b9d7-46ba17 call 40bc70 * 3 337 46ba38-46ba9d call 45340c call 401b10 call 463980 call 46379b 330->337 338 46ba19-46ba1c 330->338 355 46ba9f-46baac 337->355 356 46bac9-46bad5 call 436565 337->356 338->337 340 46ba1e-46ba33 call 408f40 338->340 345 46be8c-46beaf call 402250 * 3 340->345 359 46baae-46bac4 call 403c90 call 408f40 355->359 363 46bb16 356->363 364 46bad7-46baee RegConnectRegistryW 356->364 359->345 368 46bb1a-46bb48 RegCreateKeyExW 363->368 366 46bb10-46bb14 364->366 367 46baf0-46bb0e call 403cd0 364->367 366->368 367->359 371 46bb95-46bb99 368->371 372 46bb4a-46bb83 call 403cd0 call 403c90 call 408f40 368->372 374 46be74-46be87 RegCloseKey 371->374 375 46bb9f-46bbbe call 45340c call 4114ab 371->375 372->345 390 46bb89-46bb90 RegCloseKey 372->390 374->345 379 46be89-46be8a RegCloseKey 374->379 388 46bbc0-46bbff call 45340c call 4111c1 call 45340c * 2 RegSetValueExW 375->388 389 46bc0a-46bc26 call 45340c call 4114ab 375->389 379->345 388->374 411 46bc05 388->411 399 46bc7d-46bc96 call 45340c call 4114ab 389->399 400 46bc28-46bc66 call 45340c call 4111c1 call 45340c * 2 RegSetValueExW 389->400 390->345 415 46bd6c-46bd88 call 45340c call 4114ab 399->415 416 46bc9c-46bcef call 4533b1 call 4115d7 call 45340c call 433244 399->416 400->374 430 46bc6c-46bc78 400->430 414 46be50-46be59 411->414 421 46be5c-46be5e call 403cd0 414->421 435 46bdb0-46bdcc call 45340c call 4114ab 415->435 436 46bd8a-46bdaa call 40c650 415->436 447 46bd11-46bd34 call 45340c RegSetValueExW 416->447 448 46bcf1 416->448 426 46be63-46be71 call 408f40 421->426 426->374 430->421 451 46bdce-46bdf3 call 443006 435->451 452 46bdf9-46be15 call 45340c call 4114ab 435->452 436->435 461 46bd36-46bd58 call 403cd0 call 408f40 447->461 462 46bd5e-46bd67 call 4111dc 447->462 449 46bcf7-46bcfc 448->449 453 46bd04-46bd07 449->453 454 46bcfe-46bd00 449->454 451->452 452->426 470 46be17-46be4e call 4680ed call 443106 call 45340c RegSetValueExW 452->470 453->449 459 46bd09-46bd0b 453->459 454->453 459->447 463 46bd0d 459->463 461->462 462->374 463->447 470->374 470->414
                    APIs
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                    • RegCreateKeyExW.KERNELBASE(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CloseConnectCreateRegistry
                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                    • API String ID: 3217815495-966354055
                    • Opcode ID: c7803ef70d2202ddad4330e7ae3cb59191ed6dd812edb82ab2a14156672e9574
                    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                    • Opcode Fuzzy Hash: c7803ef70d2202ddad4330e7ae3cb59191ed6dd812edb82ab2a14156672e9574
                    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1379 46ed8e-46ee39 call 4109e0 * 2 call 40e0a0 * 2 call 402160 call 40bc70 * 3 1396 46ee4a-46ee4e 1379->1396 1397 46ee3b-46ee47 call 4152bb 1379->1397 1399 46ee50-46ee5a call 469296 1396->1399 1400 46ee61-46ee6d call 436565 1396->1400 1397->1396 1399->1400 1406 46eec5-46eed7 call 401c90 1400->1406 1407 46ee6f-46ee77 call 436565 1400->1407 1412 46eedd-46eeec call 401c90 1406->1412 1413 46f2f9-46f305 call 436565 1406->1413 1407->1406 1414 46ee79-46eec2 GetForegroundWindow call 44cdaf call 436299 call 402250 * 3 1407->1414 1412->1413 1423 46eef2-46eefd 1412->1423 1421 46f307-46f310 call 40e0a0 1413->1421 1422 46f315-46f319 1413->1422 1421->1422 1427 46f322-46f32a 1422->1427 1428 46f31b 1422->1428 1429 46ef00-46ef1c call 461a5b 1423->1429 1431 46f335-46f339 1427->1431 1432 46f32c-46f330 call 410bc0 1427->1432 1428->1427 1429->1413 1440 46ef22-46ef36 call 445ae0 1429->1440 1437 46f34a-46f354 1431->1437 1438 46f33b-46f33f 1431->1438 1432->1431 1442 46f356-46f363 GetDesktopWindow EnumChildWindows 1437->1442 1443 46f365 EnumWindows 1437->1443 1438->1437 1439 46f341-46f345 call 410bc0 1438->1439 1439->1437 1451 46f1f5-46f209 call 445ae0 1440->1451 1452 46ef3c-46ef50 call 445ae0 1440->1452 1447 46f36b-46f385 call 4457df call 4109e0 1442->1447 1443->1447 1465 46f387-46f390 call 44cdaf 1447->1465 1466 46f395-46f3be call 402250 * 3 1447->1466 1461 46f1ce-46f1f2 call 402250 * 3 1451->1461 1462 46f20b-46f20f 1451->1462 1463 46ef56-46ef6a call 445ae0 1452->1463 1464 46f24b-46f25f call 445ae0 1452->1464 1467 46f225-46f248 call 402250 * 3 1462->1467 1468 46f211-46f21f 1462->1468 1481 46f283-46f2a2 call 432c30 IsWindow 1463->1481 1482 46ef70-46ef84 call 445ae0 1463->1482 1464->1461 1483 46f265-46f26b GetForegroundWindow 1464->1483 1465->1466 1468->1467 1481->1467 1499 46f2a4-46f2a5 1481->1499 1502 46ef86-46ef8b 1482->1502 1503 46efe1-46eff5 call 445ae0 1482->1503 1490 46f26c-46f27a call 44cdaf 1483->1490 1490->1481 1499->1490 1506 46f2a7-46f2cd call 402250 * 3 1502->1506 1507 46ef91-46efa8 call 401070 1502->1507 1513 46eff7-46f009 call 40e0a0 1503->1513 1514 46f00e-46f022 call 445ae0 1503->1514 1515 46efa9-46efb2 call 46906d 1507->1515 1513->1429 1524 46f024-46f03a call 401070 1514->1524 1525 46f03f-46f053 call 445ae0 1514->1525 1515->1429 1527 46efb8-46efde call 402250 * 3 1515->1527 1524->1515 1535 46f074-46f088 call 445ae0 1525->1535 1536 46f055-46f06f call 413190 1525->1536 1543 46f08a-46f0a4 call 413190 1535->1543 1544 46f0a9-46f0bd call 445ae0 1535->1544 1536->1429 1543->1429 1551 46f0de-46f0f2 call 445ae0 1544->1551 1552 46f0bf-46f0d9 call 413190 1544->1552 1557 46f0f4-46f10e call 413190 1551->1557 1558 46f113-46f127 call 445ae0 1551->1558 1552->1429 1557->1429 1563 46f145-46f159 call 445ae0 1558->1563 1564 46f129-46f140 call 413190 1558->1564 1569 46f17a-46f18e call 445ae0 1563->1569 1570 46f15b-46f16f call 445ae0 1563->1570 1564->1429 1576 46f1b4-46f1c8 call 44cd93 1569->1576 1577 46f190-46f195 1569->1577 1570->1461 1575 46f171-46f175 1570->1575 1575->1429 1576->1429 1576->1461 1578 46f2d0-46f2f6 call 402250 * 3 1577->1578 1579 46f19b-46f1af call 40e0a0 1577->1579 1579->1429
                    APIs
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • GetForegroundWindow.USER32(?,?,?,?,?,?,?), ref: 0046EE79
                    • GetForegroundWindow.USER32(?,?,?,?,?,?), ref: 0046F265
                    • IsWindow.USER32(?), ref: 0046F29A
                    • GetDesktopWindow.USER32 ref: 0046F356
                    • EnumChildWindows.USER32(00000000), ref: 0046F35D
                    • EnumWindows.USER32(0046130D,?), ref: 0046F365
                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
                    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                    • API String ID: 329138477-1919597938
                    • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
                    • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
                    • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
                    • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1590 45cd1e-45cd4f call 45340c 1593 45cd51-45cd61 call 40c650 1590->1593 1594 45cd63 1590->1594 1593->1594 1596 45cd67-45cd6b 1593->1596 1594->1596 1598 45ce21-45cec9 call 45340c call 412fba call 410290 call 410120 call 413a0e call 411536 * 2 GetCurrentDirectoryW SetCurrentDirectoryW 1596->1598 1599 45cd71-45cd77 1596->1599 1640 45ceeb-45cefc call 433998 1598->1640 1641 45cecb-45cee8 call 408f40 1598->1641 1601 45cd81-45cd84 1599->1601 1602 45cd79-45cd7f 1599->1602 1604 45cd8b-45cd91 1601->1604 1605 45cd86-45cd89 1601->1605 1602->1604 1607 45cd93-45cd96 1604->1607 1608 45ce02 1604->1608 1605->1604 1607->1608 1611 45cd98-45cd9b 1607->1611 1609 45ce07-45ce0a 1608->1609 1614 45ce11 1609->1614 1615 45ce0c-45ce0f 1609->1615 1612 45cd9d-45cda0 1611->1612 1613 45cdfb-45ce00 1611->1613 1612->1613 1617 45cda2-45cda5 1612->1617 1613->1609 1618 45ce14-45ce1b 1614->1618 1615->1618 1620 45cdf4-45cdf9 1617->1620 1621 45cda7-45cdaa 1617->1621 1618->1598 1618->1599 1620->1609 1621->1620 1623 45cdac-45cdaf 1621->1623 1625 45cdb1-45cdb4 1623->1625 1626 45cded-45cdf2 1623->1626 1625->1626 1629 45cdb6-45cdb9 1625->1629 1626->1609 1631 45cde6-45cdeb 1629->1631 1632 45cdbb-45cdbe 1629->1632 1631->1609 1632->1631 1634 45cdc0-45cdc3 1632->1634 1636 45cdc5-45cdc8 1634->1636 1637 45cddf-45cde4 1634->1637 1636->1637 1639 45cdca-45cdcd 1636->1639 1637->1609 1642 45cdcf-45cdd2 1639->1642 1643 45cdd8-45cddd 1639->1643 1648 45cefe-45cf25 GetFileAttributesW SetFileAttributesW 1640->1648 1649 45cf69-45cf86 call 431a86 1640->1649 1642->1641 1642->1643 1643->1609 1651 45cf27-45cf30 SetCurrentDirectoryW 1648->1651 1652 45cf32-45cf36 1648->1652 1657 45cf9d-45cfae SetCurrentDirectoryW 1649->1657 1658 45cf88-45cf97 call 408f40 1649->1658 1651->1641 1654 45cf4c-45cf66 SetCurrentDirectoryW call 411567 1652->1654 1655 45cf38-45cf49 SetCurrentDirectoryW 1652->1655 1654->1649 1658->1657
                    APIs
                    • _wcsncpy.LIBCMT ref: 0045CE39
                    • __wsplitpath.LIBCMT ref: 0045CE78
                    • _wcscat.LIBCMT ref: 0045CE8B
                    • _wcscat.LIBCMT ref: 0045CE9E
                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                    • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                      • Part of subcall function 00433998: GetFileAttributesW.KERNELBASE(?), ref: 0043399F
                    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                    • _wcscpy.LIBCMT ref: 0045CF61
                    • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                    • String ID: *.*
                    • API String ID: 1153243558-438819550
                    • Opcode ID: 58ec8225262ce3d7ed1c0261d2a13a7ddc13f00c4c2e837579c97f8af69011ed
                    • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                    • Opcode Fuzzy Hash: 58ec8225262ce3d7ed1c0261d2a13a7ddc13f00c4c2e837579c97f8af69011ed
                    • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99

                    Control-flow Graph

                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • __wcsicoll.LIBCMT ref: 00402007
                    • __wcsicoll.LIBCMT ref: 0040201D
                    • __wcsicoll.LIBCMT ref: 00402033
                      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                    • __wcsicoll.LIBCMT ref: 00402049
                    • _wcscpy.LIBCMT ref: 0040207C
                    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
                    • API String ID: 3948761352-1609664196
                    • Opcode ID: 4f0c21c02193faa9ff768906f478844b44fa7f7095c61b04ff4f7656a03001fd
                    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                    • Opcode Fuzzy Hash: 4f0c21c02193faa9ff768906f478844b44fa7f7095c61b04ff4f7656a03001fd
                    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                    Control-flow Graph

                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                    • __wsplitpath.LIBCMT ref: 0040E41C
                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                    • _wcsncat.LIBCMT ref: 0040E433
                    • __wmakepath.LIBCMT ref: 0040E44F
                      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • _wcscpy.LIBCMT ref: 0040E487
                      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                    • _wcscat.LIBCMT ref: 00427541
                    • _wcslen.LIBCMT ref: 00427551
                    • _wcslen.LIBCMT ref: 00427562
                    • _wcscat.LIBCMT ref: 0042757C
                    • _wcsncpy.LIBCMT ref: 004275BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                    • String ID: Include$\
                    • API String ID: 3173733714-3429789819
                    • Opcode ID: 97055631afe68ccc8d35a07989050a773b6648bf6af3037baefc2422ebbc3f44
                    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                    • Opcode Fuzzy Hash: 97055631afe68ccc8d35a07989050a773b6648bf6af3037baefc2422ebbc3f44
                    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                    Control-flow Graph

                    APIs
                    • _fseek.LIBCMT ref: 0045292B
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                    • __fread_nolock.LIBCMT ref: 00452961
                    • __fread_nolock.LIBCMT ref: 00452971
                    • __fread_nolock.LIBCMT ref: 0045298A
                    • __fread_nolock.LIBCMT ref: 004529A5
                    • _fseek.LIBCMT ref: 004529BF
                    • _malloc.LIBCMT ref: 004529CA
                    • _malloc.LIBCMT ref: 004529D6
                    • __fread_nolock.LIBCMT ref: 004529E7
                    • _free.LIBCMT ref: 00452A17
                    • _free.LIBCMT ref: 00452A20
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                    • String ID:
                    • API String ID: 1255752989-0
                    • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                    • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1936 4531b1-4531c4 1937 45337c-453380 1936->1937 1938 4531ca-4531d0 1936->1938 1939 4531d6 1938->1939 1940 45333e-453340 1938->1940 1939->1940 1942 453234-45324b call 41329b 1939->1942 1943 453287-4532ad call 44b3f6 call 411567 call 402250 1939->1943 1944 4531f6-45320e call 413109 1939->1944 1945 453250-453253 1939->1945 1946 453213-45322f call 41329b 1939->1946 1947 4532b2-4532dd call 4115d7 1939->1947 1948 4531dd-4531f1 call 41305c 1939->1948 1941 453347-45335a call 403d80 call 4115d7 1940->1941 1980 453375-45337b 1941->1980 1981 45335c-453372 call 401b10 1941->1981 1942->1941 1943->1941 1944->1941 1952 453255-453269 call 411567 1945->1952 1953 45326e-453282 call 411567 1945->1953 1946->1941 1968 4532f1-4532f3 1947->1968 1969 4532df-4532ef call 432dfc 1947->1969 1948->1941 1952->1941 1953->1941 1975 4532f6-453309 call 403d80 call 4115d7 1968->1975 1969->1975 1988 453327-45333b call 4111dc 1975->1988 1989 45330b-453316 call 401b10 call 4111dc 1975->1989 1980->1937 1995 45331b-453324 1989->1995
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __swprintf_wcscpy$__i64tow__itow
                    • String ID: %.15g$0x%p$False$True
                    • API String ID: 3038501623-2263619337
                    • Opcode ID: 96dd5984341036dce892d2662a2964afa86873b491a19c2492bdb95b05069d72
                    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                    • Opcode Fuzzy Hash: 96dd5984341036dce892d2662a2964afa86873b491a19c2492bdb95b05069d72
                    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fread_nolock$_fseek_wcscpy
                    • String ID: FILE
                    • API String ID: 3888824918-3121273764
                    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                    • RegisterClassExW.USER32(00000030), ref: 004104ED
                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                    • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                    • ImageList_ReplaceIcon.COMCTL32(00B9F1F8,000000FF,00000000), ref: 00410552
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                    • API String ID: 2914291525-1005189915
                    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                    Control-flow Graph

                    APIs
                    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                    • LoadIconW.USER32(?,00000063), ref: 004103C0
                    • LoadIconW.USER32(?,000000A4), ref: 004103D3
                    • LoadIconW.USER32(?,000000A2), ref: 004103E6
                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                    • RegisterClassExW.USER32(?), ref: 0041045D
                      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                      • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00B9F1F8,000000FF,00000000), ref: 00410552
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                    • String ID: #$0$AutoIt v3
                    • API String ID: 423443420-4155596026
                    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2044 46beb2-46bf55 call 40bc70 * 3 call 40e710 call 45340c call 401b10 call 463980 call 46379b 2061 46bf57-46bf6b call 403c90 2044->2061 2062 46bf70-46bf7c call 436565 2044->2062 2067 46c324-46c347 call 402250 * 3 2061->2067 2068 46bfc5 2062->2068 2069 46bf7e-46bf95 RegConnectRegistryW 2062->2069 2070 46bfc9-46bfe9 RegOpenKeyExW 2068->2070 2072 46bf97-46bfba call 403cd0 call 403c90 2069->2072 2073 46bfbf-46bfc3 2069->2073 2074 46c022-46c055 call 45340c RegQueryValueExW 2070->2074 2075 46bfeb-46c004 call 403cd0 2070->2075 2072->2067 2073->2070 2088 46c057-46c087 call 403cd0 call 403c90 RegCloseKey 2074->2088 2089 46c092-46c0ab call 403cd0 2074->2089 2086 46c006-46c007 RegCloseKey 2075->2086 2087 46c00d-46c01d call 403c90 2075->2087 2086->2087 2087->2067 2088->2067 2108 46c08d 2088->2108 2099 46c0b1 2089->2099 2100 46c2fc-46c307 call 403c90 2089->2100 2099->2100 2104 46c297-46c2c5 call 453132 call 45340c RegQueryValueExW 2099->2104 2105 46c23e-46c275 call 45340c RegQueryValueExW 2099->2105 2106 46c15b-46c1a6 call 4115d7 call 45340c RegQueryValueExW 2099->2106 2107 46c0b8-46c0ff call 4115d7 call 45340c RegQueryValueExW 2099->2107 2110 46c30c-46c31f RegCloseKey 2100->2110 2104->2110 2133 46c2c7-46c2fa call 403cd0 call 403c90 call 408f40 2104->2133 2119 46c277 2105->2119 2120 46c27d-46c295 call 408f40 2105->2120 2131 46c211-46c239 call 403cd0 call 403c90 call 4111dc 2106->2131 2132 46c1a8-46c1bf 2106->2132 2129 46c101-46c125 call 40e710 call 4111dc 2107->2129 2130 46c12a-46c156 call 403cd0 call 403c90 call 4111dc 2107->2130 2114 46c321-46c322 RegCloseKey 2108->2114 2110->2067 2110->2114 2114->2067 2119->2120 2120->2110 2129->2110 2130->2110 2131->2110 2137 46c1c1-46c1c7 2132->2137 2138 46c1fc-46c20c call 40e710 call 4111dc 2132->2138 2133->2110 2144 46c1ce-46c1d2 2137->2144 2145 46c1c9-46c1ca 2137->2145 2138->2110 2147 46c1d4-46c1d9 2144->2147 2148 46c1ed-46c1f3 2144->2148 2145->2144 2154 46c1db-46c1e4 2147->2154 2155 46c1e8-46c1eb 2147->2155 2148->2138 2157 46c1f5-46c1f7 2148->2157 2154->2155 2155->2147 2155->2148 2157->2138
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BF8D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ConnectRegistry_memmove_wcslen
                    • String ID:
                    • API String ID: 15295421-0
                    • Opcode ID: eec73043bbbb06984dc7b24c8543d180b22c391ff5fcc014531d1bea68b0cf30
                    • Instruction ID: 33baa24a15bb30b806ffdc3d4c8c2128b8dbdbb38b4108e5c3e965d5e336c96e
                    • Opcode Fuzzy Hash: eec73043bbbb06984dc7b24c8543d180b22c391ff5fcc014531d1bea68b0cf30
                    • Instruction Fuzzy Hash: 89E17471204200ABD714EF69CD85F2BB7E8AF88704F14891EF985DB381D779E941CB9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _malloc
                    • String ID: Default
                    • API String ID: 1579825452-753088835
                    • Opcode ID: e39157c07a9fe78e789c49a050ed431ff183d3e0ae9e68985e0a09b751888452
                    • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                    • Opcode Fuzzy Hash: e39157c07a9fe78e789c49a050ed431ff183d3e0ae9e68985e0a09b751888452
                    • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2601 40f5c0-40f5cf call 422240 2604 40f5d0-40f5e8 2601->2604 2604->2604 2605 40f5ea-40f613 call 413650 call 410e60 2604->2605 2610 40f614-40f633 call 414d04 2605->2610 2613 40f691 2610->2613 2614 40f635-40f63c 2610->2614 2615 40f696-40f69c 2613->2615 2616 40f660-40f674 call 4150d1 2614->2616 2617 40f63e 2614->2617 2620 40f679-40f67c 2616->2620 2619 40f640 2617->2619 2621 40f642-40f650 2619->2621 2620->2610 2622 40f652-40f655 2621->2622 2623 40f67e-40f68c 2621->2623 2624 40f65b-40f65e 2622->2624 2625 425d1e-425d3e call 4150d1 call 414d04 2622->2625 2626 40f68e-40f68f 2623->2626 2627 40f69f-40f6ad 2623->2627 2624->2616 2624->2619 2637 425d43-425d5f call 414d30 2625->2637 2626->2622 2629 40f6b4-40f6c2 2627->2629 2630 40f6af-40f6b2 2627->2630 2632 425d16 2629->2632 2633 40f6c8-40f6d6 2629->2633 2630->2622 2632->2625 2635 425d05-425d0b 2633->2635 2636 40f6dc-40f6df 2633->2636 2635->2621 2638 425d11 2635->2638 2636->2622 2637->2615 2638->2632
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fread_nolock_fseek_memmove_strcat
                    • String ID: AU3!$EA06
                    • API String ID: 1268643489-2658333250
                    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754
                    APIs
                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                    • KillTimer.USER32(?,00000001,?), ref: 004011B9
                    • PostQuitMessage.USER32(00000000), ref: 004011CB
                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                    • CreatePopupMenu.USER32 ref: 00401204
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                    • String ID: TaskbarCreated
                    • API String ID: 129472671-2362178303
                    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E
                    APIs
                    • _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                    • std::exception::exception.LIBCMT ref: 00411626
                    • std::exception::exception.LIBCMT ref: 00411640
                    • __CxxThrowException@8.LIBCMT ref: 00411651
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                    • String ID: ,*H$4*H$@fI
                    • API String ID: 615853336-1459471987
                    • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                    • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D
                    APIs
                      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                    • String ID:
                    • API String ID: 3300667738-0
                    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                    APIs
                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: QueryValue$CloseOpen
                    • String ID: Include$Software\AutoIt v3\AutoIt
                    • API String ID: 1586453840-614718249
                    • Opcode ID: b71d51f64b70c65a21aacfd12bd9f8cd1a00b42160e05dfef4e297133c897f40
                    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                    • Opcode Fuzzy Hash: b71d51f64b70c65a21aacfd12bd9f8cd1a00b42160e05dfef4e297133c897f40
                    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00433EFD
                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00433F0D
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00433F38
                    • __wsplitpath.LIBCMT ref: 00433F63
                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                    • _wcscat.LIBCMT ref: 00433F76
                    • __wcsicoll.LIBCMT ref: 00433F86
                    • CloseHandle.KERNELBASE(00000000), ref: 00433FBF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                    • String ID:
                    • API String ID: 2547909840-0
                    • Opcode ID: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
                    • Instruction ID: e17d583989bb1df9e9dd6b28cd90faaf4a95b78209a4298828de810110d6b8cb
                    • Opcode Fuzzy Hash: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
                    • Instruction Fuzzy Hash: 9621EAB2800109ABC721DF50DC84FEEB7B8AB48300F5045DEF60997240EB799B84CFA4
                    APIs
                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                    • ShowWindow.USER32(?,00000000), ref: 004105E4
                    • ShowWindow.USER32(?,00000000), ref: 004105EE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$CreateShow
                    • String ID: AutoIt v3$edit
                    • API String ID: 1584632944-3779509399
                    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _malloc_wcslen$_strcat_wcscpy
                    • String ID:
                    • API String ID: 1612042205-0
                    • Opcode ID: 6d767dfd1c8969675062e9ea2281ab397cf12935de5018ef653fc5603d032817
                    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                    • Opcode Fuzzy Hash: 6d767dfd1c8969675062e9ea2281ab397cf12935de5018ef653fc5603d032817
                    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                    APIs
                    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Close$OpenQueryValue
                    • String ID: Control Panel\Mouse
                    • API String ID: 1607946009-824357125
                    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                    APIs
                    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                    • _wcsncpy.LIBCMT ref: 004102ED
                    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                    • _wcsncpy.LIBCMT ref: 00410340
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                    • String ID:
                    • API String ID: 3170942423-0
                    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: Error:
                    • API String ID: 4104443479-232661952
                    • Opcode ID: 86678f6fbf30c96828b7bd75d44360d673c824b059c9aa0e8d292ec67add6943
                    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                    • Opcode Fuzzy Hash: 86678f6fbf30c96828b7bd75d44360d673c824b059c9aa0e8d292ec67add6943
                    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                    APIs
                    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                    • String ID: X$pWH
                    • API String ID: 85490731-941433119
                    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                    APIs
                    • _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • _memmove.LIBCMT ref: 00401B57
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                    • String ID: @EXITCODE
                    • API String ID: 2734553683-3436989551
                    • Opcode ID: 4236665bcc639584f04fcdb9ba1468009aa28956b7e53f741a3b1c0e70b2e800
                    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                    • Opcode Fuzzy Hash: 4236665bcc639584f04fcdb9ba1468009aa28956b7e53f741a3b1c0e70b2e800
                    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1c41686cddfd1d02cf5155f80fed84b47dda3b49d953152d76e4693ed424cb40
                    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                    • Opcode Fuzzy Hash: 1c41686cddfd1d02cf5155f80fed84b47dda3b49d953152d76e4693ed424cb40
                    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll
                    • String ID:
                    • API String ID: 3832890014-0
                    • Opcode ID: 4287b4ee902932363878549ae2665017720e10472576bbcf08ccff82b98dbab9
                    • Instruction ID: 8cfb0e6e77498b774e675cfd1e0e99cb0b6ebb9ed9852495d4fde95f2c7dcd06
                    • Opcode Fuzzy Hash: 4287b4ee902932363878549ae2665017720e10472576bbcf08ccff82b98dbab9
                    • Instruction Fuzzy Hash: 96A1FA7220020A4FD710EF6AE8819ABB7A5EF84315F10856FFD85D7341EF3A9825CB95
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • _memmove.LIBCMT ref: 00409D96
                    • VariantInit.OLEAUT32(00000000), ref: 00429B91
                    • VariantCopy.OLEAUT32(?,?), ref: 00429B9F
                    • VariantClear.OLEAUT32(00000000), ref: 00429BB0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$ClearCopyInit_malloc_memmove
                    • String ID:
                    • API String ID: 441919481-0
                    • Opcode ID: 71c14be4e5da44e26e80ef4c67bcb72f117f3587870f7c874e6a3a3faa312fd5
                    • Instruction ID: f0c45ee732be7bd7eb5f6f37e092b4ba3ebced0f60d366c0991e47852fee2757
                    • Opcode Fuzzy Hash: 71c14be4e5da44e26e80ef4c67bcb72f117f3587870f7c874e6a3a3faa312fd5
                    • Instruction Fuzzy Hash: E1915870A083518FD720CF29D580A1ABBE1FF89300F64892EE995CB351D375EC81CB96
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __filbuf__getptd_noexit__read_memcpy_s
                    • String ID:
                    • API String ID: 1794320848-0
                    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                    APIs
                    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process$CurrentTerminate
                    • String ID:
                    • API String ID: 2429186680-0
                    • Opcode ID: d134e85caaaf8ffaa76235d0ef23b4a8fd4615b87555794ad512bc83344c7318
                    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                    • Opcode Fuzzy Hash: d134e85caaaf8ffaa76235d0ef23b4a8fd4615b87555794ad512bc83344c7318
                    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                    APIs
                      • Part of subcall function 00433396: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 004333AF
                    • IsWindowVisible.USER32(?), ref: 00443AA0
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00443ABB
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00443AF5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$TimeoutVisibleWindow
                    • String ID:
                    • API String ID: 1887043681-0
                    • Opcode ID: fd260f880937d4b7ad11ad114d0bb443268203928173bd1e8d9d1e44af8e8ecd
                    • Instruction ID: 32828324e56391f63380ddb0b1a6e844e479f891142349d64ffb7bb995e86ce1
                    • Opcode Fuzzy Hash: fd260f880937d4b7ad11ad114d0bb443268203928173bd1e8d9d1e44af8e8ecd
                    • Instruction Fuzzy Hash: 0211297264020133F7205F259D06F9FB68CDF95755F04043EF905A7281EA69EA4543AD
                    APIs
                    • _malloc.LIBCMT ref: 0043214B
                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                    • _malloc.LIBCMT ref: 0043215D
                    • _malloc.LIBCMT ref: 0043216F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _malloc$AllocateHeap
                    • String ID:
                    • API String ID: 680241177-0
                    • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                    • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                    • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                    • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                    APIs
                    • TranslateMessage.USER32(?), ref: 00409556
                    • DispatchMessageW.USER32(?), ref: 00409561
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Message$DispatchPeekTranslate
                    • String ID:
                    • API String ID: 4217535847-0
                    • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                    • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
                    • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
                    • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
                    APIs
                      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                    • _free.LIBCMT ref: 004295A0
                      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                    • String ID: >>>AUTOIT SCRIPT<<<
                    • API String ID: 3938964917-2806939583
                    • Opcode ID: 1f7c1eefc2b544f393065c993e473ec906590c75f2cf16aa2807dd237b53fd9e
                    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                    • Opcode Fuzzy Hash: 1f7c1eefc2b544f393065c993e473ec906590c75f2cf16aa2807dd237b53fd9e
                    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                    Strings
                    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _strcat
                    • String ID: >>>AUTOIT NO CMDEXECUTE<<<
                    • API String ID: 1765576173-2684727018
                    • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                    • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                    APIs
                    • EnumChildWindows.USER32(?,Function_00043A87,00497538), ref: 00443B54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ChildEnumWindows
                    • String ID: 8uI
                    • API String ID: 3555792229-2289113533
                    • Opcode ID: e3c0d3dc008ef24790ec64ee3de6af5e759e7c4489f4fbf63a25642480667149
                    • Instruction ID: acd490cec5dc1558551f0c2a7b751e8c40aeb4dc67698ce8e4734ec0afc5cdd5
                    • Opcode Fuzzy Hash: e3c0d3dc008ef24790ec64ee3de6af5e759e7c4489f4fbf63a25642480667149
                    • Instruction Fuzzy Hash: 95D0A7342B8388B7C7448F64BC004153FD86A28A30390C076F88883731D174A50043EC
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 02727fec0a6fb997275ee1cee787712c737797a990d16d3034b10376d66a2b3d
                    • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
                    • Opcode Fuzzy Hash: 02727fec0a6fb997275ee1cee787712c737797a990d16d3034b10376d66a2b3d
                    • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: be127a3183b1eb8891e1a00c61a552731f1524987eecd6dda89a1d511b0072c0
                    • Instruction ID: 87b54257044150471c739d151235b364616bdb39e4aa39848fe8ade81c39f20a
                    • Opcode Fuzzy Hash: be127a3183b1eb8891e1a00c61a552731f1524987eecd6dda89a1d511b0072c0
                    • Instruction Fuzzy Hash: 0E519371A00105EBCB14DFA5C8C1EABB7A8AF48344F1481AEF905AB692D77CED45C798
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: eca8262a414b6c2c088063a65b491cc45b2ff15206e8d4e7fdad25571c9125de
                    • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
                    • Opcode Fuzzy Hash: eca8262a414b6c2c088063a65b491cc45b2ff15206e8d4e7fdad25571c9125de
                    • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
                    APIs
                      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                    • _strcat.LIBCMT ref: 0040F786
                      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                    • String ID:
                    • API String ID: 3199840319-0
                    • Opcode ID: 8b08bc695afa497b13707d74ee6c9d7856ec466ba55f51a992c4aa08fafd23d3
                    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                    • Opcode Fuzzy Hash: 8b08bc695afa497b13707d74ee6c9d7856ec466ba55f51a992c4aa08fafd23d3
                    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                    APIs
                    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
                    • FreeLibrary.KERNEL32(?), ref: 0040D78E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FreeInfoLibraryParametersSystem
                    • String ID:
                    • API String ID: 3403648963-0
                    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                    APIs
                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                    • __lock_file.LIBCMT ref: 00414A8D
                      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                    • __fclose_nolock.LIBCMT ref: 00414A98
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                    • String ID:
                    • API String ID: 2800547568-0
                    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                    APIs
                    • timeGetTime.WINMM ref: 0040D3CC
                      • Part of subcall function 004091E0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                    • Sleep.KERNEL32(00000000), ref: 0042E19F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessagePeekSleepTimetime
                    • String ID:
                    • API String ID: 1792118007-0
                    • Opcode ID: b23f761a4926100a078f8ea7e5554c9688d511087b6a7685b7d02aad0cb4bb0e
                    • Instruction ID: 26d929e072eec6e6aac8e4f5aec239a67d26821fa4f7aa926e5107a94785e9a2
                    • Opcode Fuzzy Hash: b23f761a4926100a078f8ea7e5554c9688d511087b6a7685b7d02aad0cb4bb0e
                    • Instruction Fuzzy Hash: 2BF05E302442029BC314AF66D549B6ABBE5AB55350F10053EE91997391DBB0A800CB99
                    APIs
                    • __lock_file.LIBCMT ref: 00415012
                    • __ftell_nolock.LIBCMT ref: 0041501F
                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __ftell_nolock__getptd_noexit__lock_file
                    • String ID:
                    • API String ID: 2999321469-0
                    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 913a4f47ca2cebabeacea1086f1bf7a8fc93000fcb71f82bc43f7d7d3a132010
                    • Instruction ID: a0cb4a685bc4076edb0c92555cc2ccf01117698ee9930ed5143de82f70a35859
                    • Opcode Fuzzy Hash: 913a4f47ca2cebabeacea1086f1bf7a8fc93000fcb71f82bc43f7d7d3a132010
                    • Instruction Fuzzy Hash: D131A5B46002009BDB20DB26C884F2BB368EF45714B14892FEE4597352D73DE945D7DE
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: e69fdcf08c8102a9194e49a7af59a7dd5dceb835e16d988994474ac49afbfb67
                    • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                    • Opcode Fuzzy Hash: e69fdcf08c8102a9194e49a7af59a7dd5dceb835e16d988994474ac49afbfb67
                    • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: 7a6c9e84bf0ecff90e94b426786914be7a40fe02c837850b7a305cec813ba38e
                    • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                    • Opcode Fuzzy Hash: 7a6c9e84bf0ecff90e94b426786914be7a40fe02c837850b7a305cec813ba38e
                    • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e3e021942bb04fb377f96628c218ac0da880ad564ff5d94e9d6cbaf38ffb92bc
                    • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                    • Opcode Fuzzy Hash: e3e021942bb04fb377f96628c218ac0da880ad564ff5d94e9d6cbaf38ffb92bc
                    • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                    APIs
                    • IsWindow.USER32(00000000), ref: 0046F3F1
                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window_memmove
                    • String ID:
                    • API String ID: 517827167-0
                    • Opcode ID: 2208a62a61026380c28c017bd38c410740f4c314821637cb6c89050692d57d6c
                    • Instruction ID: bb29974ae8a0ca66dd60d7796f545a3f68a626f1234de100ca197a45a268520a
                    • Opcode Fuzzy Hash: 2208a62a61026380c28c017bd38c410740f4c314821637cb6c89050692d57d6c
                    • Instruction Fuzzy Hash: 5111CEB22001157AE200AAA6EC80DFBF75CEBD0365F04413BFD0892102DB39A95983B9
                    APIs
                    • GetShortPathNameW.KERNELBASE(00000000,?,00000104), ref: 0045CA2D
                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: NamePath$FullShort
                    • String ID:
                    • API String ID: 4229621559-0
                    • Opcode ID: d9a3c155d0b4df34825e2791da10e7f0cca77bafb194db88395ae46179c02426
                    • Instruction ID: 8cace6cff5122266c9e6cdada20a297df9d6b29dcb765e7aca24eed7bc075287
                    • Opcode Fuzzy Hash: d9a3c155d0b4df34825e2791da10e7f0cca77bafb194db88395ae46179c02426
                    • Instruction Fuzzy Hash: CF1160717002089BCB10EF65D8C5E5AB7E8AB44315F208AABF815DB243DB75ED588B94
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __lock_file
                    • String ID:
                    • API String ID: 3031932315-0
                    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • _memmove.LIBCMT ref: 00428939
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                    • String ID:
                    • API String ID: 620504543-0
                    • Opcode ID: 9b634b060f595b581fed7002801d1129ce03d7959c054cd058c5bb6f3b1246f4
                    • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
                    • Opcode Fuzzy Hash: 9b634b060f595b581fed7002801d1129ce03d7959c054cd058c5bb6f3b1246f4
                    • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • _memmove.LIBCMT ref: 0042A1F9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                    • String ID:
                    • API String ID: 620504543-0
                    • Opcode ID: 49c3b32a6e8ee6ac5652400f72d62e6aaa15f1fccae43cab5d6354079673165c
                    • Instruction ID: 68cc8252cab00b622ca44339aafc2d61880be598c309bb3a4cfd0d384b043ef6
                    • Opcode Fuzzy Hash: 49c3b32a6e8ee6ac5652400f72d62e6aaa15f1fccae43cab5d6354079673165c
                    • Instruction Fuzzy Hash: 3701FBB46001409FD310DF19D841E12B7A1BF9D308F24856DE68A8B392D636E851CBD6
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • _memmove.LIBCMT ref: 0042D3DD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                    • String ID:
                    • API String ID: 620504543-0
                    • Opcode ID: acd5c043845486b9dceff03d8581e3ade39ffd05ee8b79b9d29e9bf8d3ac88bf
                    • Instruction ID: af581a68da90144edc2fe4a64e80a785640a4d8348b9e53c1629c7674191edd2
                    • Opcode Fuzzy Hash: acd5c043845486b9dceff03d8581e3ade39ffd05ee8b79b9d29e9bf8d3ac88bf
                    • Instruction Fuzzy Hash: 58014BB46005509FCB00DF19C4D1F56B7B1AF8A308F14C1A9EA0A9F36AD735E846CBA7
                    APIs
                    • _wcslen.LIBCMT ref: 00443D34
                      • Part of subcall function 00433D9E: EnumProcesses.PSAPI(?,00000800,?,?,00443D49,?,?,?,004A8178), ref: 00433DBB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: EnumProcesses_wcslen
                    • String ID:
                    • API String ID: 3303492691-0
                    • Opcode ID: 61840f1e4be6ab7e74efaef90a4495a36a15179c598b7116193463e31052faad
                    • Instruction ID: 973e428d5754fd58bf011f848023120356fa753a79d0ada774503799e32604de
                    • Opcode Fuzzy Hash: 61840f1e4be6ab7e74efaef90a4495a36a15179c598b7116193463e31052faad
                    • Instruction Fuzzy Hash: 05E0E5B3A010187BEA106A4ABC81DCB735CDBCA72EF040027F60887221E229AE0542F9
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • _memmove.LIBCMT ref: 004287FE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
                    • String ID:
                    • API String ID: 620504543-0
                    • Opcode ID: 76cf2bc5b64ff1f45a4b2a24a218a0a66999c158c404e9d85b188c7ac59fbed7
                    • Instruction ID: 82e0d3020ff1a8d7086eb6344b20a3a53ce6f827fb60ec39918b36741b2db59f
                    • Opcode Fuzzy Hash: 76cf2bc5b64ff1f45a4b2a24a218a0a66999c158c404e9d85b188c7ac59fbed7
                    • Instruction Fuzzy Hash: 60013174600550DFD700DF19C591F1677A1BF8A308F148199E2098F366DB35E846CB96
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 004333AF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSendTimeout
                    • String ID:
                    • API String ID: 1599653421-0
                    • Opcode ID: e23ad966cf4d23ddcaa6067c5d8edeca8f958f8abcc155d695d4f0c7bc85f464
                    • Instruction ID: fe6b941a113ccd82b0823322d531ed5001cdcbf12cccf8c4cf3eb195f1307c69
                    • Opcode Fuzzy Hash: e23ad966cf4d23ddcaa6067c5d8edeca8f958f8abcc155d695d4f0c7bc85f464
                    • Instruction Fuzzy Hash: 3DD0C97139530CBBEB248B659D07FAA775C9700B55F504298BE08AA1D0E9A1AA008698
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 0043633F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSendTimeout
                    • String ID:
                    • API String ID: 1599653421-0
                    • Opcode ID: 9860d8fd04dca8f4639475c0e949a449d7e9360e0213879cd93aaa3a815527bf
                    • Instruction ID: 404f820d5c191ead8adfbb6f72584c17bf9223e8bc32b4a3dee19ec2549da310
                    • Opcode Fuzzy Hash: 9860d8fd04dca8f4639475c0e949a449d7e9360e0213879cd93aaa3a815527bf
                    • Instruction Fuzzy Hash: 9BD0C97139030876E7248A659D0BF96375C5710F40F5081257B04A91D0D9A0F5408658
                    APIs
                    • GetFileAttributesW.KERNELBASE(?), ref: 0043399F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: b77aa08cafc2a3d32093d7ac5c88f35f968f57013de6aa67bd4eb605d0773f83
                    • Instruction ID: 548271e91b042d454508b47bab6801c4e70bba6bff5a1ae8573985b3968eb280
                    • Opcode Fuzzy Hash: b77aa08cafc2a3d32093d7ac5c88f35f968f57013de6aa67bd4eb605d0773f83
                    • Instruction Fuzzy Hash: CCC08071040308964D040DEC654D5D6335C9D45335F541681F9EC8B3D1C275BDDB57D4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wfsopen
                    • String ID:
                    • API String ID: 197181222-0
                    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                    APIs
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                    • GetKeyState.USER32(00000011), ref: 0047C92D
                    • GetKeyState.USER32(00000009), ref: 0047C936
                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                    • GetKeyState.USER32(00000010), ref: 0047C953
                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                    • _wcsncpy.LIBCMT ref: 0047CA29
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                    • SendMessageW.USER32 ref: 0047CA7F
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                    • ImageList_SetDragCursorImage.COMCTL32(00B9F1F8,00000000,00000000,00000000), ref: 0047CB9B
                    • ImageList_BeginDrag.COMCTL32(00B9F1F8,00000000,000000F8,000000F0), ref: 0047CBAC
                    • SetCapture.USER32(?), ref: 0047CBB6
                    • ClientToScreen.USER32(?,?), ref: 0047CC17
                    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                    • ReleaseCapture.USER32 ref: 0047CC3A
                    • GetCursorPos.USER32(?), ref: 0047CC72
                    • ScreenToClient.USER32(?,?), ref: 0047CC80
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                    • SendMessageW.USER32 ref: 0047CD12
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                    • SendMessageW.USER32 ref: 0047CD80
                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                    • GetCursorPos.USER32(?), ref: 0047CDC8
                    • ScreenToClient.USER32(?,?), ref: 0047CDD6
                    • GetParent.USER32(00000000), ref: 0047CDF7
                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                    • SendMessageW.USER32 ref: 0047CE93
                    • ClientToScreen.USER32(?,?), ref: 0047CEEE
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,009719D8,00000000,?,?,?,?), ref: 0047CF1C
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                    • SendMessageW.USER32 ref: 0047CF6B
                    • ClientToScreen.USER32(?,?), ref: 0047CFB5
                    • TrackPopupMenuEx.USER32(?,00000080,?,?,009719D8,00000000,?,?,?,?), ref: 0047CFE6
                    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                    • String ID: @GUI_DRAGID$F
                    • API String ID: 3100379633-4164748364
                    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                    APIs
                    • GetForegroundWindow.USER32 ref: 00434420
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                    • IsIconic.USER32(?), ref: 0043444F
                    • ShowWindow.USER32(?,00000009), ref: 0043445C
                    • SetForegroundWindow.USER32(?), ref: 0043446A
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                    • GetCurrentThreadId.KERNEL32 ref: 00434485
                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                    • SetForegroundWindow.USER32(00000000), ref: 004344B7
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                    • keybd_event.USER32(00000012,00000000), ref: 004344CF
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                    • keybd_event.USER32(00000012,00000000), ref: 004344E6
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                    • keybd_event.USER32(00000012,00000000), ref: 004344FD
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                    • keybd_event.USER32(00000012,00000000), ref: 00434514
                    • SetForegroundWindow.USER32(00000000), ref: 0043451E
                    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                    • String ID: Shell_TrayWnd
                    • API String ID: 2889586943-2988720461
                    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                    APIs
                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                    • CloseHandle.KERNEL32(?), ref: 004463A0
                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                    • GetProcessWindowStation.USER32 ref: 004463D1
                    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                    • _wcslen.LIBCMT ref: 00446498
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • _wcsncpy.LIBCMT ref: 004464C0
                    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                    • UnloadUserProfile.USERENV(?,?), ref: 00446555
                    • CloseWindowStation.USER32(00000000), ref: 0044656C
                    • CloseDesktop.USER32(?), ref: 0044657A
                    • SetProcessWindowStation.USER32(?), ref: 00446588
                    • CloseHandle.KERNEL32(?), ref: 00446592
                    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                    • String ID: $@OH$default$winsta0
                    • API String ID: 3324942560-3791954436
                    • Opcode ID: 9cf51b0723e591428307cc9e2b3886c9281d645344dbd92a1f81f3c68313813d
                    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                    • Opcode Fuzzy Hash: 9cf51b0723e591428307cc9e2b3886c9281d645344dbd92a1f81f3c68313813d
                    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                    • FindClose.KERNEL32(00000000), ref: 00478924
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                    • __swprintf.LIBCMT ref: 004789D3
                    • __swprintf.LIBCMT ref: 00478A1D
                    • __swprintf.LIBCMT ref: 00478A4B
                    • __swprintf.LIBCMT ref: 00478A79
                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                    • __swprintf.LIBCMT ref: 00478AA7
                    • __swprintf.LIBCMT ref: 00478AD5
                    • __swprintf.LIBCMT ref: 00478B03
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                    • API String ID: 999945258-2428617273
                    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                    • __wsplitpath.LIBCMT ref: 00403492
                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                    • _wcscpy.LIBCMT ref: 004034A7
                    • _wcscat.LIBCMT ref: 004034BC
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                    • _wcscpy.LIBCMT ref: 004035A0
                    • _wcslen.LIBCMT ref: 00403623
                    • _wcslen.LIBCMT ref: 0040367D
                    Strings
                    • _, xrefs: 0040371C
                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                    • Unterminated string, xrefs: 00428348
                    • Error opening the file, xrefs: 00428231
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                    • API String ID: 3393021363-188983378
                    • Opcode ID: 324de8a1fe0f3da0d88a409c5e14cd4c6f55e3d53488cbe4db6aa09d6e7bec2b
                    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                    • Opcode Fuzzy Hash: 324de8a1fe0f3da0d88a409c5e14cd4c6f55e3d53488cbe4db6aa09d6e7bec2b
                    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                    APIs
                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                    • __swprintf.LIBCMT ref: 00431C2E
                    • _wcslen.LIBCMT ref: 00431C3A
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                    • String ID: :$\$\??\%s
                    • API String ID: 2192556992-3457252023
                    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                    APIs
                    • GetLocalTime.KERNEL32(?), ref: 004722A2
                    • __swprintf.LIBCMT ref: 004722B9
                    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FolderPath$LocalTime__swprintf
                    • String ID: %.3d
                    • API String ID: 3337348382-986655627
                    • Opcode ID: dcc15eaa46d4a0d2738ec7ba7639f317308a3141d952dcbe8a762de363707123
                    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                    • Opcode Fuzzy Hash: dcc15eaa46d4a0d2738ec7ba7639f317308a3141d952dcbe8a762de363707123
                    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                    APIs
                    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                    • FindClose.KERNEL32(00000000), ref: 0044291C
                    • FindClose.KERNEL32(00000000), ref: 00442930
                    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                    • FindClose.KERNEL32(00000000), ref: 004429D4
                      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                    • FindClose.KERNEL32(00000000), ref: 004429E2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                    • String ID: *.*
                    • API String ID: 2640511053-438819550
                    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                    APIs
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                    • GetLastError.KERNEL32 ref: 00433414
                    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                    • String ID: SeShutdownPrivilege
                    • API String ID: 2938487562-3733053543
                    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                    APIs
                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                    • GetLengthSid.ADVAPI32(?), ref: 004461D0
                    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                    • GetLengthSid.ADVAPI32(?), ref: 00446241
                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                    • CopySid.ADVAPI32(00000000), ref: 00446271
                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                    • String ID:
                    • API String ID: 1255039815-0
                    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                    APIs
                    • __swprintf.LIBCMT ref: 00433073
                    • __swprintf.LIBCMT ref: 00433085
                    • __wcsicoll.LIBCMT ref: 00433092
                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                    • LockResource.KERNEL32(00000000), ref: 004330CA
                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                    • LoadResource.KERNEL32(?,00000000), ref: 00433105
                    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                    • LockResource.KERNEL32(?), ref: 00433120
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                    • String ID:
                    • API String ID: 1158019794-0
                    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                    • String ID:
                    • API String ID: 1737998785-0
                    • Opcode ID: 1d54ee6c6ffcbe8b502475ba71d3bf838951398a7256c9b9d14e41aecda3c2b5
                    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                    • Opcode Fuzzy Hash: 1d54ee6c6ffcbe8b502475ba71d3bf838951398a7256c9b9d14e41aecda3c2b5
                    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                    • GetLastError.KERNEL32 ref: 0045D6BF
                    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Error$Mode$DiskFreeLastSpace
                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                    • API String ID: 4194297153-14809454
                    • Opcode ID: c6d98a091ab23568c39592cca8e4ec396818f7492da81e9ebce7ce0a32a648d7
                    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                    • Opcode Fuzzy Hash: c6d98a091ab23568c39592cca8e4ec396818f7492da81e9ebce7ce0a32a648d7
                    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove$_strncmp
                    • String ID: @oH$\$^$h
                    • API String ID: 2175499884-3701065813
                    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                    APIs
                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                    • listen.WSOCK32(00000000,00000005), ref: 00465381
                    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLast$closesocket$bindlistensocket
                    • String ID:
                    • API String ID: 540024437-0
                    • Opcode ID: 133da32ebbcac1775bcf5ac4f0173e556fe3625d18127d4dcdeb574d60dc024c
                    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                    • Opcode Fuzzy Hash: 133da32ebbcac1775bcf5ac4f0173e556fe3625d18127d4dcdeb574d60dc024c
                    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                    • API String ID: 0-2872873767
                    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                    • Sleep.KERNEL32(0000000A), ref: 0045250B
                    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                    • FindClose.KERNEL32(?), ref: 004525FF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                    • String ID: *.*$\VH
                    • API String ID: 2786137511-2657498754
                    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                    • TerminateProcess.KERNEL32(00000000), ref: 00422004
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID: pqI
                    • API String ID: 2579439406-2459173057
                    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                    APIs
                    • __wcsicoll.LIBCMT ref: 00433349
                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                    • __wcsicoll.LIBCMT ref: 00433375
                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicollmouse_event
                    • String ID: DOWN
                    • API String ID: 1033544147-711622031
                    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                    APIs
                    • GetKeyboardState.USER32(?), ref: 0044C3D2
                    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: KeyboardMessagePostState$InputSend
                    • String ID:
                    • API String ID: 3031425849-0
                    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                    APIs
                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLastinet_addrsocket
                    • String ID:
                    • API String ID: 4170576061-0
                    • Opcode ID: 906d4227354139d9a08ec9736c2f9767ac87d07e0b16e96d06688bf51879f10d
                    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                    • Opcode Fuzzy Hash: 906d4227354139d9a08ec9736c2f9767ac87d07e0b16e96d06688bf51879f10d
                    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                    APIs
                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                    • IsWindowVisible.USER32 ref: 0047A368
                    • IsWindowEnabled.USER32 ref: 0047A378
                    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                    • IsIconic.USER32 ref: 0047A393
                    • IsZoomed.USER32 ref: 0047A3A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                    • String ID:
                    • API String ID: 292994002-0
                    • Opcode ID: 670d343239ce0c819ea1f751798b33ceaa169a97bcf12266f14a6963c2bea57a
                    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                    • Opcode Fuzzy Hash: 670d343239ce0c819ea1f751798b33ceaa169a97bcf12266f14a6963c2bea57a
                    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                    APIs
                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                    • CoInitialize.OLE32(00000000), ref: 00478442
                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                    • CoUninitialize.OLE32 ref: 0047863C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                    • String ID: .lnk
                    • API String ID: 886957087-24824748
                    • Opcode ID: 30b4208e9b0406c6c7a8e802c53bbce5edc34fb9742be2da9f8b02af911b0580
                    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                    • Opcode Fuzzy Hash: 30b4208e9b0406c6c7a8e802c53bbce5edc34fb9742be2da9f8b02af911b0580
                    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                    APIs
                    • OpenClipboard.USER32(?), ref: 0046DCE7
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                    • CloseClipboard.USER32 ref: 0046DD0D
                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                    • CloseClipboard.USER32 ref: 0046DD41
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                    • CloseClipboard.USER32 ref: 0046DD99
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                    • String ID:
                    • API String ID: 15083398-0
                    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: U$\
                    • API String ID: 4104443479-100911408
                    • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                    • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                    • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                    • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Find$File$CloseFirstNext
                    • String ID:
                    • API String ID: 3541575487-0
                    • Opcode ID: 6657a256bd3447127bf08af48fffe896882875dcfe48375d14e679f7c7ae9787
                    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                    • Opcode Fuzzy Hash: 6657a256bd3447127bf08af48fffe896882875dcfe48375d14e679f7c7ae9787
                    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                    APIs
                    • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                    • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                    • FindClose.KERNEL32(00000000), ref: 004339EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FileFind$AttributesCloseFirst
                    • String ID:
                    • API String ID: 48322524-0
                    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                    APIs
                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                    • String ID:
                    • API String ID: 901099227-0
                    • Opcode ID: ea36e6d6e55528ddb9efe55bb688fb43466cd85c0523e0c2dd5cf227fb4eba41
                    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                    • Opcode Fuzzy Hash: ea36e6d6e55528ddb9efe55bb688fb43466cd85c0523e0c2dd5cf227fb4eba41
                    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                    APIs
                    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Proc
                    • String ID:
                    • API String ID: 2346855178-0
                    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                    APIs
                    • BlockInput.USER32(00000001), ref: 0045A38B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: BlockInput
                    • String ID:
                    • API String ID: 3456056419-0
                    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                    APIs
                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: LogonUser
                    • String ID:
                    • API String ID: 1244722697-0
                    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                    APIs
                    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: N@
                    • API String ID: 0-1509896676
                    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                    APIs
                    • DeleteObject.GDI32(?), ref: 0045953B
                    • DeleteObject.GDI32(?), ref: 00459551
                    • DestroyWindow.USER32(?), ref: 00459563
                    • GetDesktopWindow.USER32 ref: 00459581
                    • GetWindowRect.USER32(00000000), ref: 00459588
                    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                    • GetClientRect.USER32(00000000,?), ref: 004596F8
                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                    • GlobalLock.KERNEL32(00000000), ref: 0045978F
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                    • CloseHandle.KERNEL32(00000000), ref: 004597AC
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                    • GlobalFree.KERNEL32(00000000), ref: 004597E2
                    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                    • ShowWindow.USER32(?,00000004), ref: 00459865
                    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                    • GetStockObject.GDI32(00000011), ref: 004598CD
                    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                    • DeleteDC.GDI32(00000000), ref: 004598F8
                    • _wcslen.LIBCMT ref: 00459916
                    • _wcscpy.LIBCMT ref: 0045993A
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                    • GetDC.USER32(00000000), ref: 004599FC
                    • SelectObject.GDI32(00000000,?), ref: 00459A0C
                    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                    • String ID: $AutoIt v3$DISPLAY$static
                    • API String ID: 4040870279-2373415609
                    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                    APIs
                    • GetSysColor.USER32(00000012), ref: 0044181E
                    • SetTextColor.GDI32(?,?), ref: 00441826
                    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                    • GetSysColor.USER32(0000000F), ref: 00441849
                    • SetBkColor.GDI32(?,?), ref: 00441864
                    • SelectObject.GDI32(?,?), ref: 00441874
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                    • GetSysColor.USER32(00000010), ref: 004418B2
                    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                    • FrameRect.USER32(?,?,00000000), ref: 004418CA
                    • DeleteObject.GDI32(?), ref: 004418D5
                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                    • FillRect.USER32(?,?,?), ref: 00441970
                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                    • String ID:
                    • API String ID: 69173610-0
                    • Opcode ID: 8fbe66a1509493214dc62570249f834e0442e6c0e1b9ca0ad918976844bbf3ff
                    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                    • Opcode Fuzzy Hash: 8fbe66a1509493214dc62570249f834e0442e6c0e1b9ca0ad918976844bbf3ff
                    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                    APIs
                    • DestroyWindow.USER32(?), ref: 004590F2
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                    • GetClientRect.USER32(00000000,?), ref: 0045924E
                    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                    • GetStockObject.GDI32(00000011), ref: 004592AC
                    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                    • DeleteDC.GDI32(00000000), ref: 004592D6
                    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                    • GetStockObject.GDI32(00000011), ref: 004593D3
                    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                    • API String ID: 2910397461-517079104
                    • Opcode ID: 2e3708aca98ac166f06a2b5ab163436237bec9411e3ff559739ce95f4c24164e
                    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                    • Opcode Fuzzy Hash: 2e3708aca98ac166f06a2b5ab163436237bec9411e3ff559739ce95f4c24164e
                    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                    • API String ID: 1038674560-3360698832
                    • Opcode ID: ed28143752db45ee471bde579251593491565976bcd91f1987caa30d1fd3bc78
                    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                    • Opcode Fuzzy Hash: ed28143752db45ee471bde579251593491565976bcd91f1987caa30d1fd3bc78
                    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                    APIs
                    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                    • SetCursor.USER32(00000000), ref: 0043075B
                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                    • SetCursor.USER32(00000000), ref: 00430773
                    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                    • SetCursor.USER32(00000000), ref: 0043078B
                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                    • SetCursor.USER32(00000000), ref: 004307A3
                    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                    • SetCursor.USER32(00000000), ref: 004307BB
                    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                    • SetCursor.USER32(00000000), ref: 004307D3
                    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                    • SetCursor.USER32(00000000), ref: 004307EB
                    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                    • SetCursor.USER32(00000000), ref: 00430803
                    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                    • SetCursor.USER32(00000000), ref: 0043081B
                    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                    • SetCursor.USER32(00000000), ref: 00430833
                    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                    • SetCursor.USER32(00000000), ref: 0043084B
                    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                    • SetCursor.USER32(00000000), ref: 00430863
                    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                    • SetCursor.USER32(00000000), ref: 0043087B
                    • SetCursor.USER32(00000000), ref: 00430887
                    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                    • SetCursor.USER32(00000000), ref: 0043089F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Cursor$Load
                    • String ID:
                    • API String ID: 1675784387-0
                    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                    APIs
                    • GetSysColor.USER32(0000000E), ref: 00430913
                    • SetTextColor.GDI32(?,00000000), ref: 0043091B
                    • GetSysColor.USER32(00000012), ref: 00430933
                    • SetTextColor.GDI32(?,?), ref: 0043093B
                    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                    • GetSysColor.USER32(0000000F), ref: 00430959
                    • CreateSolidBrush.GDI32(?), ref: 00430962
                    • GetSysColor.USER32(00000011), ref: 00430979
                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                    • SelectObject.GDI32(?,00000000), ref: 0043099C
                    • SetBkColor.GDI32(?,?), ref: 004309A6
                    • SelectObject.GDI32(?,?), ref: 004309B4
                    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                    • DrawFocusRect.USER32(?,?), ref: 00430A91
                    • GetSysColor.USER32(00000011), ref: 00430A9F
                    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                    • SelectObject.GDI32(?,?), ref: 00430AD0
                    • DeleteObject.GDI32(00000105), ref: 00430ADC
                    • SelectObject.GDI32(?,?), ref: 00430AE3
                    • DeleteObject.GDI32(?), ref: 00430AE9
                    • SetTextColor.GDI32(?,?), ref: 00430AF0
                    • SetBkColor.GDI32(?,?), ref: 00430AFB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                    • String ID:
                    • API String ID: 1582027408-0
                    • Opcode ID: 7ab8f68ae92de177230986ffa0e1a1798036b774293c3b462cf701bf3f984277
                    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                    • Opcode Fuzzy Hash: 7ab8f68ae92de177230986ffa0e1a1798036b774293c3b462cf701bf3f984277
                    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                    APIs
                    • GetCursorPos.USER32(?), ref: 004566AE
                    • GetDesktopWindow.USER32 ref: 004566C3
                    • GetWindowRect.USER32(00000000), ref: 004566CA
                    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                    • DestroyWindow.USER32(?), ref: 00456746
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                    • IsWindowVisible.USER32(?), ref: 0045682C
                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                    • GetWindowRect.USER32(?,?), ref: 00456873
                    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                    • CopyRect.USER32(?,?), ref: 004568BE
                    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                    • String ID: ($,$tooltips_class32
                    • API String ID: 225202481-3320066284
                    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                    APIs
                    • OpenClipboard.USER32(?), ref: 0046DCE7
                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                    • GetClipboardData.USER32(0000000D), ref: 0046DD01
                    • CloseClipboard.USER32 ref: 0046DD0D
                    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                    • CloseClipboard.USER32 ref: 0046DD41
                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                    • GetClipboardData.USER32(00000001), ref: 0046DD8D
                    • CloseClipboard.USER32 ref: 0046DD99
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                    • String ID:
                    • API String ID: 15083398-0
                    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • GetWindowRect.USER32(?,?), ref: 00471CF7
                    • GetClientRect.USER32(?,?), ref: 00471D05
                    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                    • GetSystemMetrics.USER32(00000008), ref: 00471D20
                    • GetSystemMetrics.USER32(00000004), ref: 00471D42
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                    • GetSystemMetrics.USER32(00000007), ref: 00471D79
                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                    • GetClientRect.USER32(?,?), ref: 00471E8A
                    • GetStockObject.GDI32(00000011), ref: 00471EA6
                    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                    • String ID: @$AutoIt v3 GUI
                    • API String ID: 867697134-3359773793
                    • Opcode ID: 00a77f97e553fd72a6cbe10c1c6169f4dfcf88cf398ac727729fd0aea825547b
                    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                    • Opcode Fuzzy Hash: 00a77f97e553fd72a6cbe10c1c6169f4dfcf88cf398ac727729fd0aea825547b
                    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                    • API String ID: 1503153545-1459072770
                    • Opcode ID: 85925c8c0440be84bd8147a4dabfdb47ad30d4dfdfbe45d06415bbc0271ea1d1
                    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                    • Opcode Fuzzy Hash: 85925c8c0440be84bd8147a4dabfdb47ad30d4dfdfbe45d06415bbc0271ea1d1
                    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll$__wcsnicmp
                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                    • API String ID: 790654849-32604322
                    • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                    • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4f6942a2bf498be0accd9f7e5b3f7b77d54b1196adba58e63a8f2e0bdde0be1e
                    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                    • Opcode Fuzzy Hash: 4f6942a2bf498be0accd9f7e5b3f7b77d54b1196adba58e63a8f2e0bdde0be1e
                    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                    APIs
                      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                    • _fseek.LIBCMT ref: 00452B3B
                    • __wsplitpath.LIBCMT ref: 00452B9B
                    • _wcscpy.LIBCMT ref: 00452BB0
                    • _wcscat.LIBCMT ref: 00452BC5
                    • __wsplitpath.LIBCMT ref: 00452BEF
                    • _wcscat.LIBCMT ref: 00452C07
                    • _wcscat.LIBCMT ref: 00452C1C
                    • __fread_nolock.LIBCMT ref: 00452C53
                    • __fread_nolock.LIBCMT ref: 00452C64
                    • __fread_nolock.LIBCMT ref: 00452C83
                    • __fread_nolock.LIBCMT ref: 00452C94
                    • __fread_nolock.LIBCMT ref: 00452CB5
                    • __fread_nolock.LIBCMT ref: 00452CC6
                    • __fread_nolock.LIBCMT ref: 00452CD7
                    • __fread_nolock.LIBCMT ref: 00452CE8
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                    • __fread_nolock.LIBCMT ref: 00452D78
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                    • String ID:
                    • API String ID: 2054058615-0
                    • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                    • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                    APIs
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window
                    • String ID: 0
                    • API String ID: 2353593579-4108050209
                    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                    APIs
                    • GetSysColor.USER32(0000000F), ref: 0044A05E
                    • GetClientRect.USER32(?,?), ref: 0044A0D1
                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                    • GetWindowDC.USER32(?), ref: 0044A0F6
                    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                    • ReleaseDC.USER32(?,?), ref: 0044A11B
                    • GetSysColor.USER32(0000000F), ref: 0044A131
                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                    • GetSysColor.USER32(0000000F), ref: 0044A14F
                    • GetSysColor.USER32(00000005), ref: 0044A15B
                    • GetWindowDC.USER32(?), ref: 0044A1BE
                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                    • ReleaseDC.USER32(?,00000000), ref: 0044A229
                    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                    • GetSysColor.USER32(00000008), ref: 0044A265
                    • SetTextColor.GDI32(?,00000000), ref: 0044A270
                    • SetBkMode.GDI32(?,00000001), ref: 0044A282
                    • GetStockObject.GDI32(00000005), ref: 0044A28A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                    • String ID:
                    • API String ID: 1744303182-0
                    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                    • __mtterm.LIBCMT ref: 00417C34
                      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                    • __init_pointers.LIBCMT ref: 00417CE6
                    • __calloc_crt.LIBCMT ref: 00417D54
                    • GetCurrentThreadId.KERNEL32 ref: 00417D80
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                    • API String ID: 4163708885-3819984048
                    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: >>>AUTOIT SCRIPT<<<$\
                    • API String ID: 0-1896584978
                    • Opcode ID: 33fac51b8bb13bd8bec3c6d299849701af52236104c0364db3442f7f53e2f312
                    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                    • Opcode Fuzzy Hash: 33fac51b8bb13bd8bec3c6d299849701af52236104c0364db3442f7f53e2f312
                    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll$IconLoad
                    • String ID: blank$info$question$stop$warning
                    • API String ID: 2485277191-404129466
                    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                    APIs
                    • LoadIconW.USER32(?,00000063), ref: 0045464C
                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                    • SetWindowTextW.USER32(?,?), ref: 00454678
                    • GetDlgItem.USER32(?,000003EA), ref: 00454690
                    • SetWindowTextW.USER32(00000000,?), ref: 00454697
                    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                    • GetWindowRect.USER32(?,?), ref: 004546F5
                    • SetWindowTextW.USER32(?,?), ref: 00454765
                    • GetDesktopWindow.USER32 ref: 0045476F
                    • GetWindowRect.USER32(00000000), ref: 00454776
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                    • GetClientRect.USER32(?,?), ref: 004547D2
                    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                    • String ID:
                    • API String ID: 3869813825-0
                    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                    APIs
                    • _wcslen.LIBCMT ref: 00464B28
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                    • _wcslen.LIBCMT ref: 00464C28
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                    • _wcslen.LIBCMT ref: 00464CBA
                    • _wcslen.LIBCMT ref: 00464CD0
                    • _wcslen.LIBCMT ref: 00464CEF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$Directory$CurrentSystem
                    • String ID: D
                    • API String ID: 1914653954-2746444292
                    • Opcode ID: 4e498dcdfcd5228ef52dd99249922a96696f60c623c082095c2aa4ec762793e9
                    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                    • Opcode Fuzzy Hash: 4e498dcdfcd5228ef52dd99249922a96696f60c623c082095c2aa4ec762793e9
                    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll
                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                    • API String ID: 3832890014-4202584635
                    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                    APIs
                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                    • GetFocus.USER32 ref: 0046A0DD
                    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessagePost$CtrlFocus
                    • String ID: 0
                    • API String ID: 1534620443-4108050209
                    • Opcode ID: 6e4fac0dce10d6833b874b231559039beb1d1b4806a0ae6920c676b248a2326b
                    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                    • Opcode Fuzzy Hash: 6e4fac0dce10d6833b874b231559039beb1d1b4806a0ae6920c676b248a2326b
                    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                    APIs
                    • DestroyWindow.USER32(?), ref: 004558E3
                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$CreateDestroy
                    • String ID: ,$tooltips_class32
                    • API String ID: 1109047481-3856767331
                    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                    APIs
                    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                    • GetMenuItemCount.USER32(?), ref: 00468C45
                    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                    • GetMenuItemCount.USER32 ref: 00468CFD
                    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                    • GetCursorPos.USER32(?), ref: 00468D3F
                    • SetForegroundWindow.USER32(?), ref: 00468D49
                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                    • String ID: 0
                    • API String ID: 1441871840-4108050209
                    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                    • __swprintf.LIBCMT ref: 00460915
                    • __swprintf.LIBCMT ref: 0046092D
                    • _wprintf.LIBCMT ref: 004609E1
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                    • API String ID: 3631882475-2268648507
                    • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                    • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                    APIs
                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                    • SendMessageW.USER32 ref: 00471740
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                    • SendMessageW.USER32 ref: 0047184F
                    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                    • String ID:
                    • API String ID: 4116747274-0
                    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                    APIs
                    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                    • _wcslen.LIBCMT ref: 00461683
                    • __swprintf.LIBCMT ref: 00461721
                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                    • GetDlgCtrlID.USER32(?), ref: 00461869
                    • GetWindowRect.USER32(?,?), ref: 004618A4
                    • GetParent.USER32(?), ref: 004618C3
                    • ScreenToClient.USER32(00000000), ref: 004618CA
                    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                    • String ID: %s%u
                    • API String ID: 1899580136-679674701
                    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                    APIs
                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: InfoItemMenu$Sleep
                    • String ID: 0
                    • API String ID: 1196289194-4108050209
                    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                    APIs
                    • GetDC.USER32(00000000), ref: 0043143E
                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                    • SelectObject.GDI32(00000000,?), ref: 00431466
                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                    • String ID: (
                    • API String ID: 3300687185-3887548279
                    • Opcode ID: dc19894752850743075b3ce2ba92ce7fea412cc01e3a78a0de19676eab5e912c
                    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                    • Opcode Fuzzy Hash: dc19894752850743075b3ce2ba92ce7fea412cc01e3a78a0de19676eab5e912c
                    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                    APIs
                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                    • GetDriveTypeW.KERNEL32 ref: 0045DB32
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                    • API String ID: 1976180769-4113822522
                    • Opcode ID: f43216fbba26fb08ba5a1d9cf7b3e2a39e0c1e79fab5faa92f126de0cbc6bbc7
                    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                    • Opcode Fuzzy Hash: f43216fbba26fb08ba5a1d9cf7b3e2a39e0c1e79fab5faa92f126de0cbc6bbc7
                    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                    • String ID:
                    • API String ID: 461458858-0
                    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                    APIs
                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                    • GlobalLock.KERNEL32(00000000), ref: 004300F6
                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                    • CloseHandle.KERNEL32(00000000), ref: 00430113
                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                    • GlobalFree.KERNEL32(00000000), ref: 00430150
                    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                    • DeleteObject.GDI32(?), ref: 004301D0
                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                    • String ID:
                    • API String ID: 3969911579-0
                    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                    • String ID: 0
                    • API String ID: 956284711-4108050209
                    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                    • String ID: 0.0.0.0
                    • API String ID: 1965227024-3771769585
                    • Opcode ID: 574f74e6d8f97c498b36ad35103bf5830538585632a35b0d08f074b9ccedaaba
                    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                    • Opcode Fuzzy Hash: 574f74e6d8f97c498b36ad35103bf5830538585632a35b0d08f074b9ccedaaba
                    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                    APIs
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: SendString$_memmove_wcslen
                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                    • API String ID: 369157077-1007645807
                    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                    APIs
                    • GetParent.USER32 ref: 00445BF8
                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                    • __wcsicoll.LIBCMT ref: 00445C33
                    • __wcsicoll.LIBCMT ref: 00445C4F
                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll$ClassMessageNameParentSend
                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                    • API String ID: 3125838495-3381328864
                    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                    APIs
                    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                    • SendMessageW.USER32(?,00000402,?), ref: 00449399
                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$CharNext
                    • String ID:
                    • API String ID: 1350042424-0
                    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                    APIs
                      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                    • _wcscpy.LIBCMT ref: 004787E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                    • API String ID: 3052893215-2127371420
                    • Opcode ID: eef04dca21986ac73429ee13fddf4ca346691701be594d74174a00a6fdccabf2
                    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                    • Opcode Fuzzy Hash: eef04dca21986ac73429ee13fddf4ca346691701be594d74174a00a6fdccabf2
                    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                    APIs
                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                    • __swprintf.LIBCMT ref: 0045E7F7
                    • _wprintf.LIBCMT ref: 0045E8B3
                    • _wprintf.LIBCMT ref: 0045E8D7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                    • API String ID: 2295938435-2354261254
                    • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                    • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                    APIs
                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                    • __swprintf.LIBCMT ref: 0045E5F6
                    • _wprintf.LIBCMT ref: 0045E6A3
                    • _wprintf.LIBCMT ref: 0045E6C7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                    • API String ID: 2295938435-8599901
                    • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                    • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                    APIs
                    • timeGetTime.WINMM ref: 00443B67
                      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                    • Sleep.KERNEL32(0000000A), ref: 00443B9F
                    • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
                    • SetActiveWindow.USER32(?), ref: 00443BEC
                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
                    • Sleep.KERNEL32(000000FA), ref: 00443C2D
                    • IsWindow.USER32(?), ref: 00443C3A
                    • EndDialog.USER32(?,00000000), ref: 00443C4C
                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                    • String ID: BUTTON
                    • API String ID: 1834419854-3405671355
                    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                    • LoadStringW.USER32(00000000), ref: 00454040
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • _wprintf.LIBCMT ref: 00454074
                    • __swprintf.LIBCMT ref: 004540A3
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                    • API String ID: 455036304-4153970271
                    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                    APIs
                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                    • _memmove.LIBCMT ref: 00467EB8
                    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                    • _memmove.LIBCMT ref: 00467F6C
                    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                    • String ID:
                    • API String ID: 2170234536-0
                    • Opcode ID: 4c3f0b1365acc363140b046ec90304d59d81b8d313fde973431f466ecda86ae7
                    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                    • Opcode Fuzzy Hash: 4c3f0b1365acc363140b046ec90304d59d81b8d313fde973431f466ecda86ae7
                    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                    APIs
                    • GetKeyboardState.USER32(?), ref: 00453CE0
                    • SetKeyboardState.USER32(?), ref: 00453D3B
                    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                    • GetKeyState.USER32(000000A0), ref: 00453D75
                    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                    • GetKeyState.USER32(000000A1), ref: 00453DB5
                    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                    • GetKeyState.USER32(00000011), ref: 00453DEF
                    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                    • GetKeyState.USER32(00000012), ref: 00453E26
                    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                    • GetKeyState.USER32(0000005B), ref: 00453E5D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                    APIs
                    • GetDlgItem.USER32(?,00000001), ref: 004357DB
                    • GetWindowRect.USER32(00000000,?), ref: 004357ED
                    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                    • GetDlgItem.USER32(?,00000002), ref: 0043586A
                    • GetWindowRect.USER32(00000000,?), ref: 0043587C
                    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                    • GetWindowRect.USER32(00000000,?), ref: 004358EE
                    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                    • GetDlgItem.USER32(?,000003EA), ref: 00435941
                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$ItemMoveRect$Invalidate
                    • String ID:
                    • API String ID: 3096461208-0
                    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                    APIs
                    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                    • DeleteObject.GDI32(?), ref: 0047151E
                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                    • DeleteObject.GDI32(?), ref: 004715EA
                    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                    • String ID:
                    • API String ID: 3218148540-0
                    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                    • String ID:
                    • API String ID: 136442275-0
                    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                    APIs
                    • _wcsncpy.LIBCMT ref: 00467490
                    • _wcsncpy.LIBCMT ref: 004674BC
                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                    • _wcstok.LIBCMT ref: 004674FF
                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                    • _wcstok.LIBCMT ref: 004675B2
                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                    • _wcslen.LIBCMT ref: 00467793
                    • _wcscpy.LIBCMT ref: 00467641
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • _wcslen.LIBCMT ref: 004677BD
                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                    • String ID: X
                    • API String ID: 3104067586-3081909835
                    • Opcode ID: 1045bfc14b63df13a467eeca99990e0a74b08a066155332e93790759e62389c6
                    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                    • Opcode Fuzzy Hash: 1045bfc14b63df13a467eeca99990e0a74b08a066155332e93790759e62389c6
                    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                    APIs
                    • OleInitialize.OLE32(00000000), ref: 0046CBC7
                    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                    • _wcslen.LIBCMT ref: 0046CDB0
                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                    • CoTaskMemFree.OLE32(?), ref: 0046CE42
                    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                    Strings
                    • NULL Pointer assignment, xrefs: 0046CEA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                    • String ID: NULL Pointer assignment
                    • API String ID: 440038798-2785691316
                    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                    APIs
                    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                    • _wcslen.LIBCMT ref: 004610A3
                    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                    • GetWindowRect.USER32(?,?), ref: 00461248
                      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                    • String ID: ThumbnailClass
                    • API String ID: 4136854206-1241985126
                    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                    APIs
                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                    • GetClientRect.USER32(?,?), ref: 00471A1A
                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                    • DestroyIcon.USER32(?), ref: 00471AF4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                    • String ID: 2
                    • API String ID: 1331449709-450215437
                    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                    • __swprintf.LIBCMT ref: 00460915
                    • __swprintf.LIBCMT ref: 0046092D
                    • _wprintf.LIBCMT ref: 004609E1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                    • API String ID: 3054410614-2561132961
                    • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                    • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                    APIs
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                    • CLSIDFromString.OLE32(?,?), ref: 004587B3
                    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                    • RegCloseKey.ADVAPI32(?), ref: 004587C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                    • API String ID: 600699880-22481851
                    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DestroyWindow
                    • String ID: static
                    • API String ID: 3375834691-2160076837
                    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$DriveType
                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                    • API String ID: 2907320926-3566645568
                    • Opcode ID: aedfb09eaf7d1885baa311c3667c2454feb9daa3be0fd7c57974b0ef3c8fef5f
                    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                    • Opcode Fuzzy Hash: aedfb09eaf7d1885baa311c3667c2454feb9daa3be0fd7c57974b0ef3c8fef5f
                    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                    APIs
                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                    • DeleteObject.GDI32(?), ref: 00470A04
                    • DestroyIcon.USER32(?), ref: 00470A1C
                    • DeleteObject.GDI32(?), ref: 00470A34
                    • DestroyWindow.USER32(?), ref: 00470A4C
                    • DestroyIcon.USER32(?), ref: 00470A73
                    • DestroyIcon.USER32(?), ref: 00470A81
                    • KillTimer.USER32(00000000,00000000), ref: 00470B00
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                    • String ID:
                    • API String ID: 1237572874-0
                    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                    APIs
                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                    • VariantInit.OLEAUT32(?), ref: 004793E1
                    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                    • VariantCopy.OLEAUT32(?,?), ref: 00479461
                    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                    • VariantClear.OLEAUT32(?), ref: 00479489
                    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                    • VariantClear.OLEAUT32(?), ref: 004794CA
                    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                    • String ID:
                    • API String ID: 2706829360-0
                    • Opcode ID: 970736fd18011ceabbea827093773aa6c4ccaeec83b036ca436635ca692da54f
                    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                    • Opcode Fuzzy Hash: 970736fd18011ceabbea827093773aa6c4ccaeec83b036ca436635ca692da54f
                    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                    APIs
                    • GetKeyboardState.USER32(?), ref: 0044480E
                    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                    • GetKeyState.USER32(000000A0), ref: 004448AA
                    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                    • GetKeyState.USER32(000000A1), ref: 004448D9
                    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                    • GetKeyState.USER32(00000011), ref: 00444903
                    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                    • GetKeyState.USER32(00000012), ref: 0044492D
                    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                    • GetKeyState.USER32(0000005B), ref: 00444958
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: State$Async$Keyboard
                    • String ID:
                    • API String ID: 541375521-0
                    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                    • String ID:
                    • API String ID: 3413494760-0
                    • Opcode ID: fa2499f20205bbb248e4852e31cb22712c52359019893baa7a5060ca17a31c62
                    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                    • Opcode Fuzzy Hash: fa2499f20205bbb248e4852e31cb22712c52359019893baa7a5060ca17a31c62
                    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressProc_free_malloc$_strcat_strlen
                    • String ID: AU3_FreeVar
                    • API String ID: 2634073740-771828931
                    • Opcode ID: 2a06080dac88d882967d2d326e37fd51eb7e04a3299764f0efaee5f492645773
                    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                    • Opcode Fuzzy Hash: 2a06080dac88d882967d2d326e37fd51eb7e04a3299764f0efaee5f492645773
                    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                    APIs
                    • CoInitialize.OLE32 ref: 0046C63A
                    • CoUninitialize.OLE32 ref: 0046C645
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                    • IIDFromString.OLE32(?,?), ref: 0046C705
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                    • API String ID: 2294789929-1287834457
                    • Opcode ID: 8b80c77c2bdaea75eec11ce758cd2f9ec9f4a29dfe234f2e260ca4a41de31459
                    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                    • Opcode Fuzzy Hash: 8b80c77c2bdaea75eec11ce758cd2f9ec9f4a29dfe234f2e260ca4a41de31459
                    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                    APIs
                      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                    • ImageList_EndDrag.COMCTL32 ref: 00471169
                    • ReleaseCapture.USER32 ref: 0047116F
                    • SetWindowTextW.USER32(?,00000000), ref: 00471206
                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                    • API String ID: 2483343779-2107944366
                    • Opcode ID: e8308dc8583040de31f1b528f2f7a2f0b11d0c4f62df072d8957ac68bb6fa9a6
                    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                    • Opcode Fuzzy Hash: e8308dc8583040de31f1b528f2f7a2f0b11d0c4f62df072d8957ac68bb6fa9a6
                    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                    APIs
                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                    • _wcslen.LIBCMT ref: 00450720
                    • _wcscat.LIBCMT ref: 00450733
                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$Window_wcscat_wcslen
                    • String ID: -----$SysListView32
                    • API String ID: 4008455318-3975388722
                    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                    • GetParent.USER32 ref: 00469C98
                    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                    • GetParent.USER32 ref: 00469CBC
                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$CtrlParent$_memmove_wcslen
                    • String ID: ComboBox$ListBox
                    • API String ID: 2360848162-1403004172
                    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                    • String ID:
                    • API String ID: 262282135-0
                    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                    APIs
                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow
                    • String ID:
                    • API String ID: 312131281-0
                    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00434643
                    • GetForegroundWindow.USER32(00000000), ref: 00434655
                    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                    • String ID:
                    • API String ID: 2156557900-0
                    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                    • API String ID: 0-1603158881
                    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                    APIs
                    • CreateMenu.USER32 ref: 00448603
                    • SetMenu.USER32(?,00000000), ref: 00448613
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                    • IsMenu.USER32(?), ref: 004486AB
                    • CreatePopupMenu.USER32 ref: 004486B5
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                    • DrawMenuBar.USER32 ref: 004486F5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                    • String ID: 0
                    • API String ID: 161812096-4108050209
                    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 26b1842e4a8dd4203b81440ed6954dae88ff53cccd997804462c34e67b4cdb7d
                    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                    • Opcode Fuzzy Hash: 26b1842e4a8dd4203b81440ed6954dae88ff53cccd997804462c34e67b4cdb7d
                    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                    APIs
                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                      • Part of subcall function 00433998: GetFileAttributesW.KERNELBASE(?), ref: 0043399F
                    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                    • MoveFileW.KERNEL32(?,?), ref: 00453932
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                    • String ID:
                    • API String ID: 978794511-0
                    • Opcode ID: 23c2b7ffb135b574b02d808823cf5fca2a18e7a19613e6fe38d3dda42be61a09
                    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                    • Opcode Fuzzy Hash: 23c2b7ffb135b574b02d808823cf5fca2a18e7a19613e6fe38d3dda42be61a09
                    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClearVariant
                    • String ID:
                    • API String ID: 1473721057-0
                    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove$_memcmp
                    • String ID: '$\$h
                    • API String ID: 2205784470-1303700344
                    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                    APIs
                    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                    • VariantClear.OLEAUT32 ref: 0045EA6D
                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                    • __swprintf.LIBCMT ref: 0045EC33
                    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                    Strings
                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$InitTime$ClearCopySystem__swprintf
                    • String ID: %4d%02d%02d%02d%02d%02d
                    • API String ID: 2441338619-1568723262
                    • Opcode ID: e2197c8b6d1a4d9a8a9e1448f1b5ea6f1907c9c7a5155c1da1f306723f8fa2c8
                    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                    • Opcode Fuzzy Hash: e2197c8b6d1a4d9a8a9e1448f1b5ea6f1907c9c7a5155c1da1f306723f8fa2c8
                    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                    APIs
                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                    • Sleep.KERNEL32(0000000A), ref: 0042C67F
                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Interlocked$DecrementIncrement$Sleep
                    • String ID: @COM_EVENTOBJ
                    • API String ID: 327565842-2228938565
                    • Opcode ID: 2f3bba44cff615a3fe7fee3d153822c0496939d9e725858111617ec0372b6016
                    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                    • Opcode Fuzzy Hash: 2f3bba44cff615a3fe7fee3d153822c0496939d9e725858111617ec0372b6016
                    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                    APIs
                    • VariantClear.OLEAUT32(?), ref: 0047031B
                    • VariantClear.OLEAUT32(?), ref: 0047044F
                    • VariantInit.OLEAUT32(?), ref: 004704A3
                    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                    • VariantClear.OLEAUT32(?), ref: 00470516
                      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                    • VariantClear.OLEAUT32(00000000), ref: 0047060D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$Clear$Copy$CallDispFuncInit
                    • String ID: H
                    • API String ID: 3613100350-2852464175
                    • Opcode ID: 8fac8d8b08cbbbb00363c64d8fcee213582a1533076d0835eb38e06b751662ca
                    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                    • Opcode Fuzzy Hash: 8fac8d8b08cbbbb00363c64d8fcee213582a1533076d0835eb38e06b751662ca
                    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                    APIs
                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                    • DestroyWindow.USER32(?), ref: 00426F50
                    • UnregisterHotKey.USER32(?), ref: 00426F77
                    • FreeLibrary.KERNEL32(?), ref: 0042701F
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                    • String ID: close all
                    • API String ID: 4174999648-3243417748
                    • Opcode ID: 8e37cf67119557e98678e7cd5d5bd23571411024f7f99960c925112da7c3c475
                    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                    • Opcode Fuzzy Hash: 8e37cf67119557e98678e7cd5d5bd23571411024f7f99960c925112da7c3c475
                    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                    APIs
                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                    • String ID:
                    • API String ID: 1291720006-3916222277
                    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                    APIs
                    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                    • IsMenu.USER32(?), ref: 0045FC5F
                    • CreatePopupMenu.USER32 ref: 0045FC97
                    • GetMenuItemCount.USER32(?), ref: 0045FCFD
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                    • String ID: 0$2
                    • API String ID: 93392585-3793063076
                    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                    APIs
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                    • VariantClear.OLEAUT32(?), ref: 00435320
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                    • VariantClear.OLEAUT32(?), ref: 004353B3
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                    • String ID: crts
                    • API String ID: 586820018-3724388283
                    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                    APIs
                      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                    • _wcscat.LIBCMT ref: 0044BCAF
                    • _wcslen.LIBCMT ref: 0044BCBB
                    • _wcslen.LIBCMT ref: 0044BCD1
                    • SHFileOperationW.SHELL32(?), ref: 0044BD17
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                    • String ID: \*.*
                    • API String ID: 2326526234-1173974218
                    • Opcode ID: 8155cc5c78a7bc42eccb396127c4893ba636a7bf9ba2c7e31ed518a28feffc61
                    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                    • Opcode Fuzzy Hash: 8155cc5c78a7bc42eccb396127c4893ba636a7bf9ba2c7e31ed518a28feffc61
                    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                    APIs
                      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                    • _wcslen.LIBCMT ref: 004335F2
                    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                    • GetLastError.KERNEL32 ref: 0043362B
                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                    • _wcsrchr.LIBCMT ref: 00433666
                      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                    • String ID: \
                    • API String ID: 321622961-2967466578
                    • Opcode ID: 356163df8a866a0a81ba4182d44b6fa43b1bb46f34699c53dc7f1f754300b54c
                    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                    • Opcode Fuzzy Hash: 356163df8a866a0a81ba4182d44b6fa43b1bb46f34699c53dc7f1f754300b54c
                    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsnicmp
                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                    • API String ID: 1038674560-2734436370
                    • Opcode ID: b883a2fdf3978347b1b7be7f621fd53b115601d5c4255198bca370dfc8578f54
                    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                    • Opcode Fuzzy Hash: b883a2fdf3978347b1b7be7f621fd53b115601d5c4255198bca370dfc8578f54
                    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
                    • LoadStringW.USER32(00000000), ref: 00434060
                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                    • LoadStringW.USER32(00000000), ref: 00434078
                    • _wprintf.LIBCMT ref: 004340A1
                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                    Strings
                    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: HandleLoadModuleString$Message_wprintf
                    • String ID: %s (%d) : ==> %s: %s %s
                    • API String ID: 3648134473-3128320259
                    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                    • __lock.LIBCMT ref: 00417981
                      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                    • __lock.LIBCMT ref: 004179A2
                    • ___addlocaleref.LIBCMT ref: 004179C0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                    • String ID: KERNEL32.DLL$pI
                    • API String ID: 637971194-197072765
                    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove$_malloc
                    • String ID:
                    • API String ID: 1938898002-0
                    • Opcode ID: ff26a84839b02f4c09df43665ce06af7614bf8fc1c2c7de3decfea855339221f
                    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                    • Opcode Fuzzy Hash: ff26a84839b02f4c09df43665ce06af7614bf8fc1c2c7de3decfea855339221f
                    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                    APIs
                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                    • _memmove.LIBCMT ref: 0044B555
                    • _memmove.LIBCMT ref: 0044B578
                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                    • String ID:
                    • API String ID: 2737351978-0
                    • Opcode ID: e947bf379bc02a31214aeeb1f05869c6802a0d1cec002da453664eee126330e4
                    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                    • Opcode Fuzzy Hash: e947bf379bc02a31214aeeb1f05869c6802a0d1cec002da453664eee126330e4
                    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                    APIs
                    • ___set_flsgetvalue.LIBCMT ref: 0041523A
                    • __calloc_crt.LIBCMT ref: 00415246
                    • __getptd.LIBCMT ref: 00415253
                    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                    • _free.LIBCMT ref: 0041529E
                    • __dosmaperr.LIBCMT ref: 004152A9
                      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                    • String ID:
                    • API String ID: 3638380555-0
                    • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                    • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 0046C96E
                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$Copy$ClearErrorInitLast
                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                    • API String ID: 3207048006-625585964
                    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                    APIs
                    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                    • gethostbyname.WSOCK32(?), ref: 004655A6
                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                    • _memmove.LIBCMT ref: 004656CA
                    • GlobalFree.KERNEL32(00000000), ref: 0046575C
                    • WSACleanup.WSOCK32 ref: 00465762
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                    • String ID:
                    • API String ID: 2945290962-0
                    • Opcode ID: 61d94dfe8135649db9fe2fa3bf775a832a6f6b155f624a1a371343423691875b
                    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                    • Opcode Fuzzy Hash: 61d94dfe8135649db9fe2fa3bf775a832a6f6b155f624a1a371343423691875b
                    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                    APIs
                    • GetSystemMetrics.USER32(0000000F), ref: 00440527
                    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                    • String ID:
                    • API String ID: 1457242333-0
                    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ConnectRegistry_memmove_wcslen
                    • String ID:
                    • API String ID: 15295421-0
                    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                    APIs
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • _wcstok.LIBCMT ref: 004675B2
                      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                    • _wcscpy.LIBCMT ref: 00467641
                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                    • _wcslen.LIBCMT ref: 00467793
                    • _wcslen.LIBCMT ref: 004677BD
                      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                    • String ID: X
                    • API String ID: 780548581-3081909835
                    • Opcode ID: 29f6a6fad416cd61667d0c7ad2d3ef5b5d809c3d7ae875abcb0bf99a6d65ddfe
                    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                    • Opcode Fuzzy Hash: 29f6a6fad416cd61667d0c7ad2d3ef5b5d809c3d7ae875abcb0bf99a6d65ddfe
                    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                    APIs
                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                    • CloseFigure.GDI32(?), ref: 0044751F
                    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                    • String ID:
                    • API String ID: 4082120231-0
                    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                    • String ID:
                    • API String ID: 2027346449-0
                    • Opcode ID: 7cdefffd16f9e0be9b38984aa58d14b591901f04b3f33eeccf5bf40e87674113
                    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                    • Opcode Fuzzy Hash: 7cdefffd16f9e0be9b38984aa58d14b591901f04b3f33eeccf5bf40e87674113
                    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                    • GetMenu.USER32 ref: 0047A703
                    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                    • _wcslen.LIBCMT ref: 0047A79E
                    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                    • String ID:
                    • API String ID: 3257027151-0
                    • Opcode ID: cdef26ff530e4ba0712c697085308bc37ccc7daccaa732a6640dd049554d26a5
                    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                    • Opcode Fuzzy Hash: cdef26ff530e4ba0712c697085308bc37ccc7daccaa732a6640dd049554d26a5
                    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                    APIs
                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLastselect
                    • String ID:
                    • API String ID: 215497628-0
                    • Opcode ID: 47bed441e76e5157298d6301bcc3396693e066f5bf28aa4f59e2e3b8855017fb
                    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                    • Opcode Fuzzy Hash: 47bed441e76e5157298d6301bcc3396693e066f5bf28aa4f59e2e3b8855017fb
                    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                    APIs
                    • GetParent.USER32(?), ref: 0044443B
                    • GetKeyboardState.USER32(?), ref: 00444450
                    • SetKeyboardState.USER32(?), ref: 004444A4
                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                    APIs
                    • GetParent.USER32(?), ref: 00444633
                    • GetKeyboardState.USER32(?), ref: 00444648
                    • SetKeyboardState.USER32(?), ref: 0044469C
                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$Parent
                    • String ID:
                    • API String ID: 87235514-0
                    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                    APIs
                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                    • DeleteObject.GDI32(?), ref: 00455736
                    • DeleteObject.GDI32(?), ref: 00455744
                    • DestroyIcon.USER32(?), ref: 00455752
                    • DestroyWindow.USER32(?), ref: 00455760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                    • String ID:
                    • API String ID: 2354583917-0
                    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                    APIs
                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Enable$Show$MessageMoveSend
                    • String ID:
                    • API String ID: 896007046-0
                    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                    APIs
                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                    • GetFocus.USER32 ref: 00448ACF
                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Enable$Show$FocusMessageSend
                    • String ID:
                    • API String ID: 3429747543-0
                    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                    • __swprintf.LIBCMT ref: 0045D4E9
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume__swprintf
                    • String ID: %lu$\VH
                    • API String ID: 3164766367-2432546070
                    • Opcode ID: 3c74b278df1f20cf999657a88b33940b51dc1b122113c0825645dcd35a42e3cd
                    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                    • Opcode Fuzzy Hash: 3c74b278df1f20cf999657a88b33940b51dc1b122113c0825645dcd35a42e3cd
                    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                    APIs
                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Msctls_Progress32
                    • API String ID: 3850602802-3636473452
                    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                    • String ID:
                    • API String ID: 3985565216-0
                    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                    APIs
                    • _malloc.LIBCMT ref: 0041F707
                      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                    • _free.LIBCMT ref: 0041F71A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AllocateHeap_free_malloc
                    • String ID: [B
                    • API String ID: 1020059152-632041663
                    • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                    • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                    APIs
                      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                    • String ID:
                    • API String ID: 1957940570-0
                    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                    APIs
                    • GetClientRect.USER32(?,?), ref: 004302E6
                    • GetWindowRect.USER32(00000000,?), ref: 00430316
                    • GetClientRect.USER32(?,?), ref: 00430364
                    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                    • GetWindowRect.USER32(?,?), ref: 004303C3
                    • ScreenToClient.USER32(?,?), ref: 004303EC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Rect$Client$Window$MetricsScreenSystem
                    • String ID:
                    • API String ID: 3220332590-0
                    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove_strncmp
                    • String ID: >$U$\
                    • API String ID: 2666721431-237099441
                    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                    APIs
                    • GetKeyboardState.USER32(?), ref: 0044C570
                    • SetKeyboardState.USER32(00000080), ref: 0044C594
                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessagePost$KeyboardState$InputSend
                    • String ID:
                    • API String ID: 2221674350-0
                    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcscpy$_wcscat
                    • String ID:
                    • API String ID: 2037614760-0
                    • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                    • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                    APIs
                    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                    • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                    • VariantCopy.OLEAUT32(?,?), ref: 00451C27
                    • VariantClear.OLEAUT32(?), ref: 00451CA1
                    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$Copy$AllocClearErrorLastString
                    • String ID:
                    • API String ID: 960795272-0
                    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                    APIs
                    • BeginPaint.USER32(00000000,?), ref: 00447BDF
                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                    • EndPaint.USER32(?,?), ref: 00447D13
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                    • String ID:
                    • API String ID: 4189319755-0
                    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                    APIs
                    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow$InvalidateRect
                    • String ID:
                    • API String ID: 1976402638-0
                    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                    APIs
                    • ShowWindow.USER32(?,00000000), ref: 00440A8A
                    • EnableWindow.USER32(?,00000000), ref: 00440AAF
                    • ShowWindow.USER32(?,00000000), ref: 00440B18
                    • ShowWindow.USER32(?,00000004), ref: 00440B2B
                    • EnableWindow.USER32(?,00000001), ref: 00440B50
                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Show$Enable$MessageSend
                    • String ID:
                    • API String ID: 642888154-0
                    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$Copy$ClearErrorLast
                    • String ID: NULL Pointer assignment$Not an Object type
                    • API String ID: 2487901850-572801152
                    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                    APIs
                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Enable$Show$MessageSend
                    • String ID:
                    • API String ID: 1871949834-0
                    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                    APIs
                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                    • SendMessageW.USER32 ref: 00471AE3
                    • DestroyIcon.USER32(?), ref: 00471AF4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                    • String ID:
                    • API String ID: 3611059338-0
                    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DestroyWindow$DeleteObject$IconMove
                    • String ID:
                    • API String ID: 1640429340-0
                    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                    APIs
                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                    • _wcslen.LIBCMT ref: 004438CD
                    • _wcslen.LIBCMT ref: 004438E6
                    • _wcstok.LIBCMT ref: 004438F8
                    • _wcslen.LIBCMT ref: 0044390C
                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                    • _wcstok.LIBCMT ref: 00443931
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                    • String ID:
                    • API String ID: 3632110297-0
                    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteMenuObject$IconWindow
                    • String ID:
                    • API String ID: 752480666-0
                    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                    • String ID:
                    • API String ID: 3275902921-0
                    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                    • String ID:
                    • API String ID: 3275902921-0
                    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                    APIs
                    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: PerformanceQuery$CounterSleep$Frequency
                    • String ID:
                    • API String ID: 2833360925-0
                    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                    APIs
                    • SendMessageW.USER32 ref: 004555C7
                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                    • DeleteObject.GDI32(?), ref: 00455736
                    • DeleteObject.GDI32(?), ref: 00455744
                    • DestroyIcon.USER32(?), ref: 00455752
                    • DestroyWindow.USER32(?), ref: 00455760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                    • String ID:
                    • API String ID: 3691411573-0
                    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                    APIs
                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                    • LineTo.GDI32(?,?,?), ref: 004472AC
                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                    • LineTo.GDI32(?,?,?), ref: 004472C6
                    • EndPath.GDI32(?), ref: 004472D6
                    • StrokePath.GDI32(?), ref: 004472E4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                    • String ID:
                    • API String ID: 372113273-0
                    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                    APIs
                    • GetDC.USER32(00000000), ref: 0044CC6D
                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CapsDevice$Release
                    • String ID:
                    • API String ID: 1035833867-0
                    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                    APIs
                    • __getptd.LIBCMT ref: 0041708E
                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                    • __amsg_exit.LIBCMT ref: 004170AE
                    • __lock.LIBCMT ref: 004170BE
                    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                    • _free.LIBCMT ref: 004170EE
                    • InterlockedIncrement.KERNEL32(00972CB8), ref: 00417106
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3470314060-0
                    • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                    • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                    APIs
                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                    • String ID:
                    • API String ID: 3495660284-0
                    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                    APIs
                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Virtual
                    • String ID:
                    • API String ID: 4278518827-0
                    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                    APIs
                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                    • ExitThread.KERNEL32 ref: 004151ED
                    • __freefls@4.LIBCMT ref: 00415209
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                    • String ID:
                    • API String ID: 442100245-0
                    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                    APIs
                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                    • _wcslen.LIBCMT ref: 0045F94A
                    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                    • String ID: 0
                    • API String ID: 621800784-4108050209
                    • Opcode ID: 27a8d1a391d44048803f5840ac21889e260530b75c30abb05853da563ac7c2fc
                    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                    • Opcode Fuzzy Hash: 27a8d1a391d44048803f5840ac21889e260530b75c30abb05853da563ac7c2fc
                    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • SetErrorMode.KERNEL32 ref: 004781CE
                    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                      • Part of subcall function 00433998: GetFileAttributesW.KERNELBASE(?), ref: 0043399F
                    • SetErrorMode.KERNEL32(?), ref: 00478270
                    • SetErrorMode.KERNEL32(?), ref: 00478340
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$AttributesFile_memmove_wcslen
                    • String ID: \VH
                    • API String ID: 3884216118-234962358
                    • Opcode ID: 0f804f9281dfebadc0cf690c4f5efedd0f6ac265e2b3626cfd6701f98267c759
                    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                    • Opcode Fuzzy Hash: 0f804f9281dfebadc0cf690c4f5efedd0f6ac265e2b3626cfd6701f98267c759
                    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                    APIs
                    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                    • IsMenu.USER32(?), ref: 0044854D
                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                    • DrawMenuBar.USER32 ref: 004485AF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$Item$DrawInfoInsert
                    • String ID: 0
                    • API String ID: 3076010158-4108050209
                    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$_memmove_wcslen
                    • String ID: ComboBox$ListBox
                    • API String ID: 1589278365-1403004172
                    • Opcode ID: a3e5deef570432abf3bc9486306cbd98ce2c8926ab4e4026a15b875f20c7008a
                    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                    • Opcode Fuzzy Hash: a3e5deef570432abf3bc9486306cbd98ce2c8926ab4e4026a15b875f20c7008a
                    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Handle
                    • String ID: nul
                    • API String ID: 2519475695-2873401336
                    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Handle
                    • String ID: nul
                    • API String ID: 2519475695-2873401336
                    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                    APIs
                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                    • _wcsncpy.LIBCMT ref: 00401C41
                    • _wcscpy.LIBCMT ref: 00401C5D
                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                    • String ID: Line:
                    • API String ID: 1874344091-1585850449
                    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: SysAnimate32
                    • API String ID: 0-1011021900
                    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                    APIs
                      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                    • GetFocus.USER32 ref: 0046157B
                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                    • __swprintf.LIBCMT ref: 00461608
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                    • String ID: %s%d
                    • API String ID: 2645982514-1110647743
                    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                    APIs
                    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process$CloseCountersCurrentHandleOpen
                    • String ID:
                    • API String ID: 3488606520-0
                    • Opcode ID: e68ba2cd99b518da07cc20790ece634acd31146d14f52fff1df461cf5a48723e
                    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                    • Opcode Fuzzy Hash: e68ba2cd99b518da07cc20790ece634acd31146d14f52fff1df461cf5a48723e
                    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                    APIs
                      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ConnectRegistry_memmove_wcslen
                    • String ID:
                    • API String ID: 15295421-0
                    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                    APIs
                    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressProc$Library$FreeLoad
                    • String ID:
                    • API String ID: 2449869053-0
                    • Opcode ID: 9379fb01d3edca8d3289f378ffa8a83188ab276edb3c770f61684f5ad0201f14
                    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                    • Opcode Fuzzy Hash: 9379fb01d3edca8d3289f378ffa8a83188ab276edb3c770f61684f5ad0201f14
                    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                    APIs
                    • GetCursorPos.USER32(?), ref: 004563A6
                    • ScreenToClient.USER32(?,?), ref: 004563C3
                    • GetAsyncKeyState.USER32(?), ref: 00456400
                    • GetAsyncKeyState.USER32(?), ref: 00456410
                    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AsyncState$ClientCursorLongScreenWindow
                    • String ID:
                    • API String ID: 3539004672-0
                    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                    APIs
                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                    • Sleep.KERNEL32(0000000A), ref: 0047D455
                    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Interlocked$DecrementIncrement$Sleep
                    • String ID:
                    • API String ID: 327565842-0
                    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                    APIs
                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: PrivateProfile$SectionWrite$String
                    • String ID:
                    • API String ID: 2832842796-0
                    • Opcode ID: c9f10585610fffa7a4941cd4de679b7a605c4e2db3209749f595237ca159c93c
                    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                    • Opcode Fuzzy Hash: c9f10585610fffa7a4941cd4de679b7a605c4e2db3209749f595237ca159c93c
                    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                    APIs
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Enum$CloseDeleteOpen
                    • String ID:
                    • API String ID: 2095303065-0
                    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00436A24
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: RectWindow
                    • String ID:
                    • API String ID: 861336768-0
                    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                    APIs
                    • SendMessageW.USER32 ref: 00449598
                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                    • _wcslen.LIBCMT ref: 0044960D
                    • _wcslen.LIBCMT ref: 0044961A
                    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$_wcslen$_wcspbrk
                    • String ID:
                    • API String ID: 1856069659-0
                    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                    APIs
                    • GetCursorPos.USER32(?), ref: 004478E2
                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                    • GetCursorPos.USER32(00000000), ref: 0044796A
                    • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CursorMenuPopupTrack$Proc
                    • String ID:
                    • API String ID: 1300944170-0
                    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                    APIs
                    • GetClientRect.USER32(?,?), ref: 004479CC
                    • GetCursorPos.USER32(?), ref: 004479D7
                    • ScreenToClient.USER32(?,?), ref: 004479F3
                    • WindowFromPoint.USER32(?,?), ref: 00447A34
                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Client$CursorFromPointProcRectScreenWindow
                    • String ID:
                    • API String ID: 1822080540-0
                    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00447C5D
                    • ScreenToClient.USER32(?,?), ref: 00447C7B
                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                    • EndPaint.USER32(?,?), ref: 00447D13
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                    • String ID:
                    • API String ID: 659298297-0
                    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                    APIs
                    • EnableWindow.USER32(?,00000000), ref: 00448B5C
                    • EnableWindow.USER32(?,00000001), ref: 00448B72
                    • ShowWindow.USER32(?,00000000), ref: 00448BE8
                    • ShowWindow.USER32(?,00000004), ref: 00448BF4
                    • EnableWindow.USER32(?,00000001), ref: 00448C09
                      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                      • Part of subcall function 00440D98: SendMessageW.USER32(009719D8,000000F1,00000000,00000000), ref: 00440E6E
                      • Part of subcall function 00440D98: SendMessageW.USER32(009719D8,000000F1,00000001,00000000), ref: 00440E9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$EnableMessageSend$LongShow
                    • String ID:
                    • API String ID: 142311417-0
                    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                    APIs
                    • IsWindowVisible.USER32(?), ref: 00445879
                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                    • _wcslen.LIBCMT ref: 004458FB
                    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                    • String ID:
                    • API String ID: 3087257052-0
                    • Opcode ID: 87f2121dd3d0783e4f2c7c8a50dbd6b160e2f8a0d560d336332df0721e11bb00
                    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                    • Opcode Fuzzy Hash: 87f2121dd3d0783e4f2c7c8a50dbd6b160e2f8a0d560d336332df0721e11bb00
                    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                    APIs
                      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                    • String ID:
                    • API String ID: 245547762-0
                    • Opcode ID: ab3d549aff74bfda8e20a763475a3ff1b254c2f95599c04f8f7aed96718de768
                    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                    • Opcode Fuzzy Hash: ab3d549aff74bfda8e20a763475a3ff1b254c2f95599c04f8f7aed96718de768
                    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                    APIs
                    • DeleteObject.GDI32(00000000), ref: 004471D8
                    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                    • SelectObject.GDI32(?,00000000), ref: 00447228
                    • BeginPath.GDI32(?), ref: 0044723D
                    • SelectObject.GDI32(?,00000000), ref: 00447266
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Object$Select$BeginCreateDeletePath
                    • String ID:
                    • API String ID: 2338827641-0
                    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00434598
                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                    • Sleep.KERNEL32(00000000), ref: 004345D4
                    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuerySleep
                    • String ID:
                    • API String ID: 2875609808-0
                    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                    APIs
                    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                    • MessageBeep.USER32(00000000), ref: 00460C46
                    • KillTimer.USER32(?,0000040A), ref: 00460C68
                    • EndDialog.USER32(?,00000001), ref: 00460C83
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                    • String ID:
                    • API String ID: 3741023627-0
                    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteObjectWindow$Icon
                    • String ID:
                    • API String ID: 4023252218-0
                    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                    APIs
                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                    • DeleteObject.GDI32(?), ref: 00455736
                    • DeleteObject.GDI32(?), ref: 00455744
                    • DestroyIcon.USER32(?), ref: 00455752
                    • DestroyWindow.USER32(?), ref: 00455760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                    • String ID:
                    • API String ID: 1489400265-0
                    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                    APIs
                      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                    • DestroyWindow.USER32(?), ref: 00455728
                    • DeleteObject.GDI32(?), ref: 00455736
                    • DeleteObject.GDI32(?), ref: 00455744
                    • DestroyIcon.USER32(?), ref: 00455752
                    • DestroyWindow.USER32(?), ref: 00455760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                    • String ID:
                    • API String ID: 1042038666-0
                    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                    APIs
                    • __getptd.LIBCMT ref: 0041780F
                      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                    • __getptd.LIBCMT ref: 00417826
                    • __amsg_exit.LIBCMT ref: 00417834
                    • __lock.LIBCMT ref: 00417844
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                    APIs
                      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                    • ___set_flsgetvalue.LIBCMT ref: 004151C0
                      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                    • ___fls_getvalue@4.LIBCMT ref: 004151CB
                      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                    • ___fls_setvalue@8.LIBCMT ref: 004151DD
                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                    • ExitThread.KERNEL32 ref: 004151ED
                    • __freefls@4.LIBCMT ref: 00415209
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                    • String ID:
                    • API String ID: 4247068974-0
                    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID:
                    • String ID: )$U$\
                    • API String ID: 0-3705770531
                    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                    APIs
                      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                    • CoInitialize.OLE32(00000000), ref: 0046E505
                    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                    • CoUninitialize.OLE32 ref: 0046E53D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                    • String ID: .lnk
                    • API String ID: 886957087-24824748
                    • Opcode ID: 0508cbec2a76d722dc53238e91c1df8c2ad0259cc1504436ac03b4b5b1a0e939
                    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                    • Opcode Fuzzy Hash: 0508cbec2a76d722dc53238e91c1df8c2ad0259cc1504436ac03b4b5b1a0e939
                    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \
                    • API String ID: 4104443479-2967466578
                    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \
                    • API String ID: 4104443479-2967466578
                    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \
                    • API String ID: 4104443479-2967466578
                    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                    Strings
                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                    • API String ID: 708495834-557222456
                    • Opcode ID: 4d00f69409de7d54112de46bbbf71e68c3389c43982ef4a76da95135637879c1
                    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                    • Opcode Fuzzy Hash: 4d00f69409de7d54112de46bbbf71e68c3389c43982ef4a76da95135637879c1
                    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                    APIs
                      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                    • String ID: @
                    • API String ID: 4150878124-2766056989
                    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \$]$h
                    • API String ID: 4104443479-3262404753
                    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                    APIs
                    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                    • CloseHandle.KERNEL32(?), ref: 00457E09
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                    • String ID: <$@
                    • API String ID: 2417854910-1426351568
                    • Opcode ID: 2271f4a7f1fc102040e8427a4a05dbe94b9e5f45104d1f296ad41dff915a82a4
                    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                    • Opcode Fuzzy Hash: 2271f4a7f1fc102040e8427a4a05dbe94b9e5f45104d1f296ad41dff915a82a4
                    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                    APIs
                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                    • String ID:
                    • API String ID: 3705125965-3916222277
                    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                    APIs
                    • GetMenuItemInfoW.USER32 ref: 0045FAC4
                    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$Delete$InfoItem
                    • String ID: 0
                    • API String ID: 135850232-4108050209
                    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                    APIs
                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Long
                    • String ID: SysTreeView32
                    • API String ID: 847901565-1698111956
                    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                    APIs
                    • LoadLibraryA.KERNEL32(?), ref: 00434B10
                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                    • FreeLibrary.KERNEL32(?), ref: 00434B9F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Library$AddressFreeLoadProc
                    • String ID: AU3_GetPluginDetails
                    • API String ID: 145871493-4132174516
                    • Opcode ID: 30437f1650ac4655ce8d70ba5017794265ffa5c0dba7bcdaa5f91c9e7a9673ff
                    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                    • Opcode Fuzzy Hash: 30437f1650ac4655ce8d70ba5017794265ffa5c0dba7bcdaa5f91c9e7a9673ff
                    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                    APIs
                    • DestroyWindow.USER32(00000000), ref: 00450A2F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DestroyWindow
                    • String ID: msctls_updown32
                    • API String ID: 3375834691-2298589950
                    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: $<
                    • API String ID: 4104443479-428540627
                    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID: \VH
                    • API String ID: 1682464887-234962358
                    • Opcode ID: 85bd2caf3796ba0b0f053ba992da92010d07664030c513f9d8ac7e7a715c302e
                    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                    • Opcode Fuzzy Hash: 85bd2caf3796ba0b0f053ba992da92010d07664030c513f9d8ac7e7a715c302e
                    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID: \VH
                    • API String ID: 1682464887-234962358
                    • Opcode ID: f6bbf98ca6ed37e81b785b662cd39c05527e75e4535a5ceb72cc9dca4b449390
                    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                    • Opcode Fuzzy Hash: f6bbf98ca6ed37e81b785b662cd39c05527e75e4535a5ceb72cc9dca4b449390
                    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$DiskFreeSpace
                    • String ID: \VH
                    • API String ID: 1682464887-234962358
                    • Opcode ID: 389b5e5849801810369fdf3bafc978a5afd6c00bdff158ce415aa11e389b4048
                    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                    • Opcode Fuzzy Hash: 389b5e5849801810369fdf3bafc978a5afd6c00bdff158ce415aa11e389b4048
                    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume
                    • String ID: \VH
                    • API String ID: 2507767853-234962358
                    • Opcode ID: 5221d5afa27771fc45be25c71451e006a3cd9a593c438bd72528faa7f8a0ea7b
                    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                    • Opcode Fuzzy Hash: 5221d5afa27771fc45be25c71451e006a3cd9a593c438bd72528faa7f8a0ea7b
                    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$InformationVolume
                    • String ID: \VH
                    • API String ID: 2507767853-234962358
                    • Opcode ID: 903363eb0a28bd6b59ba2fbe5a7d50a414aaac4e1809903e70f447eb39f217b1
                    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                    • Opcode Fuzzy Hash: 903363eb0a28bd6b59ba2fbe5a7d50a414aaac4e1809903e70f447eb39f217b1
                    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                    APIs
                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: msctls_trackbar32
                    • API String ID: 3850602802-1010561917
                    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                    • String ID: crts
                    • API String ID: 943502515-3724388283
                    • Opcode ID: 28ab0cd56152a94c47980da784a5334fcbb399d674d4bcd85e7971757b421f27
                    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                    • Opcode Fuzzy Hash: 28ab0cd56152a94c47980da784a5334fcbb399d674d4bcd85e7971757b421f27
                    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                    APIs
                    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                    • SetErrorMode.KERNEL32(?), ref: 0045D35C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorMode$LabelVolume
                    • String ID: \VH
                    • API String ID: 2006950084-234962358
                    • Opcode ID: 281f653d5a1f9a02037ddc29d96d5806ef67bad8d15e1c9b41fdb6b55023fe5b
                    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                    • Opcode Fuzzy Hash: 281f653d5a1f9a02037ddc29d96d5806ef67bad8d15e1c9b41fdb6b55023fe5b
                    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                    APIs
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • GetMenuItemInfoW.USER32 ref: 00449727
                    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                    • DrawMenuBar.USER32 ref: 00449761
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Menu$InfoItem$Draw_malloc
                    • String ID: 0
                    • API String ID: 772068139-4108050209
                    • Opcode ID: 0031032e81017570b3b9c15a3492affb6bce377042da116d7325b0c6912d9dd9
                    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                    • Opcode Fuzzy Hash: 0031032e81017570b3b9c15a3492affb6bce377042da116d7325b0c6912d9dd9
                    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$_wcscpy
                    • String ID: 3, 3, 8, 1
                    • API String ID: 3469035223-357260408
                    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                    APIs
                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: ICMP.DLL$IcmpCloseHandle
                    • API String ID: 2574300362-3530519716
                    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                    APIs
                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: ICMP.DLL$IcmpCreateFile
                    • API String ID: 2574300362-275556492
                    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                    APIs
                    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: ICMP.DLL$IcmpSendEcho
                    • API String ID: 2574300362-58917771
                    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                    APIs
                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: RegDeleteKeyExW$advapi32.dll
                    • API String ID: 2574300362-4033151799
                    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                    APIs
                    • VariantInit.OLEAUT32(?), ref: 0047950F
                    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                    • VariantClear.OLEAUT32(?), ref: 00479650
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$AllocClearCopyInitString
                    • String ID:
                    • API String ID: 2808897238-0
                    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                    APIs
                    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                    • __itow.LIBCMT ref: 004699CD
                      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                    • __itow.LIBCMT ref: 00469A97
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$__itow
                    • String ID:
                    • API String ID: 3379773720-0
                    • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                    • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00449A4A
                    • ScreenToClient.USER32(?,?), ref: 00449A80
                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$ClientMoveRectScreen
                    • String ID:
                    • API String ID: 3880355969-0
                    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                    • String ID:
                    • API String ID: 2782032738-0
                    • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                    • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                    APIs
                    • ClientToScreen.USER32(00000000,?), ref: 0044169A
                    • GetWindowRect.USER32(?,?), ref: 00441722
                    • PtInRect.USER32(?,?,?), ref: 00441734
                    • MessageBeep.USER32(00000000), ref: 004417AD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Rect$BeepClientMessageScreenWindow
                    • String ID:
                    • API String ID: 1352109105-0
                    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                    APIs
                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CreateHardLink$DeleteErrorFileLast
                    • String ID:
                    • API String ID: 3321077145-0
                    • Opcode ID: daac92b833bceb194f056a4b47f02584370becc183bb9fb340b085e6c80b66ec
                    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                    • Opcode Fuzzy Hash: daac92b833bceb194f056a4b47f02584370becc183bb9fb340b085e6c80b66ec
                    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                    • __isleadbyte_l.LIBCMT ref: 004208A6
                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                    APIs
                    • GetParent.USER32(?), ref: 004503C8
                    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Proc$Parent
                    • String ID:
                    • API String ID: 2351499541-0
                    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                    • TranslateMessage.USER32(?), ref: 00442B01
                    • DispatchMessageW.USER32(?), ref: 00442B0B
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Message$Peek$DispatchTranslate
                    • String ID:
                    • API String ID: 1795658109-0
                    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                    APIs
                    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                    • GetCaretPos.USER32(?), ref: 004743B2
                    • ClientToScreen.USER32(00000000,?), ref: 004743E8
                    • GetForegroundWindow.USER32 ref: 004743EE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                    • String ID:
                    • API String ID: 2759813231-0
                    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                    APIs
                      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                    • _wcslen.LIBCMT ref: 00449519
                    • _wcslen.LIBCMT ref: 00449526
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend_wcslen$_wcspbrk
                    • String ID:
                    • API String ID: 2886238975-0
                    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __setmode$DebugOutputString_fprintf
                    • String ID:
                    • API String ID: 1792727568-0
                    • Opcode ID: a17b2d49d7a4b2190a4e005b035fbe4a458944acecb25bf2c7f65936ec8c7af4
                    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                    • Opcode Fuzzy Hash: a17b2d49d7a4b2190a4e005b035fbe4a458944acecb25bf2c7f65936ec8c7af4
                    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                    APIs
                      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$Long$AttributesLayered
                    • String ID:
                    • API String ID: 2169480361-0
                    • Opcode ID: 70637752d6aeead86ae29d3ec4f9b525ca189b7c446d945953e32eccde7b3508
                    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                    • Opcode Fuzzy Hash: 70637752d6aeead86ae29d3ec4f9b525ca189b7c446d945953e32eccde7b3508
                    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                    APIs
                      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                    • lstrlenW.KERNEL32(?), ref: 00434CF6
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: lstrcmpilstrcpylstrlen$_malloc
                    • String ID: cdecl
                    • API String ID: 3850814276-3896280584
                    • Opcode ID: 1ddbb8f26c4211a38b9eb1dfed9cf0767519cb39407429e676dd8a2079463d90
                    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                    • Opcode Fuzzy Hash: 1ddbb8f26c4211a38b9eb1dfed9cf0767519cb39407429e676dd8a2079463d90
                    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                    APIs
                      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                    • _memmove.LIBCMT ref: 0046D475
                    • inet_ntoa.WSOCK32(?), ref: 0046D481
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                    • String ID:
                    • API String ID: 2502553879-0
                    • Opcode ID: afbb327836be4a084c61f8c7139e7a96a8244a5d26c5d677608a1e202b7e6d65
                    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                    • Opcode Fuzzy Hash: afbb327836be4a084c61f8c7139e7a96a8244a5d26c5d677608a1e202b7e6d65
                    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                    APIs
                    • SendMessageW.USER32 ref: 00448C69
                    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend$LongWindow
                    • String ID:
                    • API String ID: 312131281-0
                    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                    APIs
                    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLastacceptselect
                    • String ID:
                    • API String ID: 385091864-0
                    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                    APIs
                    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                    APIs
                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                    • GetStockObject.GDI32(00000011), ref: 00430258
                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Window$CreateMessageObjectSendShowStock
                    • String ID:
                    • API String ID: 1358664141-0
                    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                    APIs
                    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                    • String ID:
                    • API String ID: 2880819207-0
                    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                    APIs
                    • GetWindowRect.USER32(?,?), ref: 00430BA2
                    • ScreenToClient.USER32(?,?), ref: 00430BC1
                    • ScreenToClient.USER32(?,?), ref: 00430BE2
                    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ClientRectScreen$InvalidateWindow
                    • String ID:
                    • API String ID: 357397906-0
                    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                    APIs
                    • __wsplitpath.LIBCMT ref: 0043392E
                      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                    • __wsplitpath.LIBCMT ref: 00433950
                    • __wcsicoll.LIBCMT ref: 00433974
                    • __wcsicoll.LIBCMT ref: 0043398A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                    • String ID:
                    • API String ID: 1187119602-0
                    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                    • String ID:
                    • API String ID: 1597257046-0
                    • Opcode ID: 0a767b6ca439f9155149bfce20b44c84bbe0d146e7977e4498aa3abf4e4411d7
                    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                    • Opcode Fuzzy Hash: 0a767b6ca439f9155149bfce20b44c84bbe0d146e7977e4498aa3abf4e4411d7
                    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                    APIs
                    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                    • __malloc_crt.LIBCMT ref: 0041F5B6
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: EnvironmentStrings$Free__malloc_crt
                    • String ID:
                    • API String ID: 237123855-0
                    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: DeleteDestroyObject$IconWindow
                    • String ID:
                    • API String ID: 3349847261-0
                    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                    APIs
                    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                    • String ID:
                    • API String ID: 2223660684-0
                    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                    APIs
                      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                    • LineTo.GDI32(?,?,?), ref: 00447326
                    • EndPath.GDI32(?), ref: 00447336
                    • StrokePath.GDI32(?), ref: 00447344
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                    • String ID:
                    • API String ID: 2783949968-0
                    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                    APIs
                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                    • GetCurrentThreadId.KERNEL32 ref: 004364A3
                    • AttachThreadInput.USER32(00000000), ref: 004364AA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                    • String ID:
                    • API String ID: 2710830443-0
                    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                    • String ID:
                    • API String ID: 146765662-0
                    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                    APIs
                    • GetDesktopWindow.USER32 ref: 00472B63
                    • GetDC.USER32(00000000), ref: 00472B6C
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                    • ReleaseDC.USER32(00000000,?), ref: 00472B99
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                    APIs
                    • GetDesktopWindow.USER32 ref: 00472BB2
                    • GetDC.USER32(00000000), ref: 00472BBB
                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CapsDesktopDeviceReleaseWindow
                    • String ID:
                    • API String ID: 2889604237-0
                    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                    APIs
                    • __getptd_noexit.LIBCMT ref: 00415150
                      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                    • __freeptd.LIBCMT ref: 0041516B
                    • ExitThread.KERNEL32 ref: 00415173
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                    • String ID:
                    • API String ID: 1454798553-0
                    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _strncmp
                    • String ID: Q\E
                    • API String ID: 909875538-2189900498
                    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                    APIs
                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
                      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
                      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                    • String ID: AutoIt3GUI$Container
                    • API String ID: 2652923123-3941886329
                    • Opcode ID: 07a57e7960170bdd837ebb7c984c5f31a800b532da81cd094bec597c216b7f8a
                    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                    • Opcode Fuzzy Hash: 07a57e7960170bdd837ebb7c984c5f31a800b532da81cd094bec597c216b7f8a
                    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove_strncmp
                    • String ID: U$\
                    • API String ID: 2666721431-100911408
                    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                    APIs
                      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                    • __wcsnicmp.LIBCMT ref: 00467288
                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                    • String ID: LPT
                    • API String ID: 3035604524-1350329615
                    • Opcode ID: 1fe2987665f43d82db3e7f5f253c00c663174ae23d456e97c3d229011d53ab6e
                    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                    • Opcode Fuzzy Hash: 1fe2987665f43d82db3e7f5f253c00c663174ae23d456e97c3d229011d53ab6e
                    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \$h
                    • API String ID: 4104443479-677774858
                    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memcmp
                    • String ID: &
                    • API String ID: 2931989736-1010288
                    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: \
                    • API String ID: 4104443479-2967466578
                    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                    APIs
                    • _wcslen.LIBCMT ref: 00466825
                    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CrackInternet_wcslen
                    • String ID: |
                    • API String ID: 596671847-2343686810
                    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                    APIs
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: '
                    • API String ID: 3850602802-1997036262
                    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                    APIs
                    • _strlen.LIBCMT ref: 0040F858
                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                    • _sprintf.LIBCMT ref: 0040F9AE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove$_sprintf_strlen
                    • String ID: %02X
                    • API String ID: 1921645428-436463671
                    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                    APIs
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID: Combobox
                    • API String ID: 3850602802-2096851135
                    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                    APIs
                    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: LengthMessageSendTextWindow
                    • String ID: edit
                    • API String ID: 2978978980-2167791130
                    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                    APIs
                    • Sleep.KERNEL32(00000000), ref: 00476CB0
                    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: GlobalMemorySleepStatus
                    • String ID: @
                    • API String ID: 2783356886-2766056989
                    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: htonsinet_addr
                    • String ID: 255.255.255.255
                    • API String ID: 3832099526-2422070025
                    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                    APIs
                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: InternetOpen
                    • String ID: <local>
                    • API String ID: 2038078732-4266983199
                    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: __fread_nolock_memmove
                    • String ID: EA06
                    • API String ID: 1988441806-3962188686
                    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID: u,D
                    • API String ID: 4104443479-3858472334
                    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                    APIs
                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                    • wsprintfW.USER32 ref: 0045612A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: MessageSend_mallocwsprintf
                    • String ID: %d/%02d/%02d
                    • API String ID: 1262938277-328681919
                    • Opcode ID: 176057d1547a49c229b5c6d08b1f9f4639a001779c71fa0498bff8c6852dc9fc
                    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                    • Opcode Fuzzy Hash: 176057d1547a49c229b5c6d08b1f9f4639a001779c71fa0498bff8c6852dc9fc
                    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                    APIs
                    • InternetCloseHandle.WININET(?), ref: 00442663
                    • InternetCloseHandle.WININET ref: 00442668
                      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: CloseHandleInternet$ObjectSingleWait
                    • String ID: aeB
                    • API String ID: 857135153-906807131
                    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                    APIs
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                    • PostMessageW.USER32(00000000), ref: 00441C05
                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                    APIs
                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: FindMessagePostSleepWindow
                    • String ID: Shell_TrayWnd
                    • API String ID: 529655941-2988720461
                    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                    APIs
                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2628776271.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.2628747950.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628846899.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628877968.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628907097.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2628932647.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2629125225.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_hgTNnG8vjD.jbxd
                    Similarity
                    • API ID: Message_doexit
                    • String ID: AutoIt$Error allocating memory.
                    • API String ID: 1993061046-4017498283
                    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D