Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TT 0205O241694086-CREDIT001.exe

Overview

General Information

Sample name:TT 0205O241694086-CREDIT001.exe
Analysis ID:1519459
MD5:b4e2e1f10ea0a5ac94f8578464d28c85
SHA1:a4ef5347b3e986694078fd98f217e6daa1dd8dad
SHA256:8750d7bb299badc971fa5a607936d4feb49b584e70ba7dd8b874bd3a8cf13ac9
Tags:exeuser-TeamDreier
Infos:

Detection

FormBook
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • TT 0205O241694086-CREDIT001.exe (PID: 5308 cmdline: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe" MD5: B4E2E1F10EA0A5AC94F8578464D28C85)
    • svchost.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f3e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17452:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c1a0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1420f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e5e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x16652:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f3e3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x17452:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", CommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", ParentImage: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, ParentProcessId: 5308, ParentProcessName: TT 0205O241694086-CREDIT001.exe, ProcessCommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", ProcessId: 6348, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", CommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", ParentImage: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, ParentProcessId: 5308, ParentProcessName: TT 0205O241694086-CREDIT001.exe, ProcessCommandLine: "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe", ProcessId: 6348, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: TT 0205O241694086-CREDIT001.exeAvira: detected
          Source: TT 0205O241694086-CREDIT001.exeReversingLabs: Detection: 66%
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: TT 0205O241694086-CREDIT001.exeJoe Sandbox ML: detected
          Source: TT 0205O241694086-CREDIT001.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2119119653.0000000004610000.00000004.00001000.00020000.00000000.sdmp, TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2122152165.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2447029624.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2445191237.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.000000000399E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2119119653.0000000004610000.00000004.00001000.00020000.00000000.sdmp, TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2122152165.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2484272630.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2447029624.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2445191237.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.000000000399E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C683 NtClose,2_2_0042C683
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B60 NtClose,LdrInitializeThunk,2_2_03872B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03872DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038735C0 NtCreateMutant,LdrInitializeThunk,2_2_038735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874340 NtSetContextThread,2_2_03874340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03874650 NtSuspendThread,2_2_03874650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872B80 NtQueryInformationFile,2_2_03872B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BA0 NtEnumerateValueKey,2_2_03872BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BE0 NtQueryValueKey,2_2_03872BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872BF0 NtAllocateVirtualMemory,2_2_03872BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AB0 NtWaitForSingleObject,2_2_03872AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AD0 NtReadFile,2_2_03872AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872AF0 NtWriteFile,2_2_03872AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F90 NtProtectVirtualMemory,2_2_03872F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FA0 NtQuerySection,2_2_03872FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FB0 NtResumeThread,2_2_03872FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872FE0 NtCreateFile,2_2_03872FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F30 NtCreateSection,2_2_03872F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872F60 NtCreateProcessEx,2_2_03872F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E80 NtReadVirtualMemory,2_2_03872E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EA0 NtAdjustPrivilegesToken,2_2_03872EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872EE0 NtQueueApcThread,2_2_03872EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872E30 NtWriteVirtualMemory,2_2_03872E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DB0 NtEnumerateKey,2_2_03872DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872DD0 NtDelayExecution,2_2_03872DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D00 NtSetInformationFile,2_2_03872D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D10 NtMapViewOfSection,2_2_03872D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872D30 NtUnmapViewOfSection,2_2_03872D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CA0 NtQueryInformationToken,2_2_03872CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CC0 NtQueryVirtualMemory,2_2_03872CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872CF0 NtOpenProcess,2_2_03872CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C00 NtQueryInformationProcess,2_2_03872C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C60 NtCreateKey,2_2_03872C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872C70 NtFreeVirtualMemory,2_2_03872C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873090 NtSetValueKey,2_2_03873090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873010 NtOpenDirectoryObject,2_2_03873010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038739B0 NtGetContextThread,2_2_038739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D10 NtOpenProcessToken,2_2_03873D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03873D70 NtOpenThread,2_2_03873D70
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004096A00_2_004096A0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0042200C0_2_0042200C
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0041A2170_2_0041A217
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004122160_2_00412216
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0042435D0_2_0042435D
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004033C00_2_004033C0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044F4300_2_0044F430
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004125E80_2_004125E8
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044663B0_2_0044663B
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004138010_2_00413801
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0042096F0_2_0042096F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004129D00_2_004129D0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004119E30_2_004119E3
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0041C9AE0_2_0041C9AE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0047EA6F0_2_0047EA6F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040FA100_2_0040FA10
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044EB5F0_2_0044EB5F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00423C810_2_00423C81
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00411E780_2_00411E78
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00442E0C0_2_00442E0C
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00420EC00_2_00420EC0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044CF170_2_0044CF17
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00444FD20_2_00444FD2
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A56A80_2_041A56A8
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A8EB00_2_041A8EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100332_2_00410033
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E0B32_2_0040E0B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011B02_2_004011B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022B02_2_004022B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042ECD32_2_0042ECD3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004025C02_2_004025C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE132_2_0040FE13
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004167C32_2_004167C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402FA02_2_00402FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004167BE2_2_004167BE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F02_2_0384E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039003E62_2_039003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA3522_2_038FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C02C02_2_038C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E02742_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F41A22_2_038F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039001AA2_2_039001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F81CC2_2_038F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038301002_2_03830100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA1182_2_038DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C81582_2_038C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D20002_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C02_2_0383C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038647502_2_03864750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038407702_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C6E02_2_0385C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039005912_2_03900591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038405352_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EE4F62_2_038EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E44202_2_038E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F24462_2_038F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F6BD72_2_038F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB402_2_038FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA802_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A02_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390A9A62_2_0390A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038569622_2_03856962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038268B82_2_038268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E8F02_2_0386E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384A8402_2_0384A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038428402_2_03842840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BEFA02_2_038BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832FC82_2_03832FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384CFE02_2_0384CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03882F282_2_03882F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860F302_2_03860F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E2F302_2_038E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4F402_2_038B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852E902_2_03852E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FCE932_2_038FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEEDB2_2_038FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FEE262_2_038FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840E592_2_03840E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03858DBF2_2_03858DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383ADE02_2_0383ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384AD002_2_0384AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DCD1F2_2_038DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0CB52_2_038E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830CF22_2_03830CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840C002_2_03840C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0388739A2_2_0388739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F132D2_2_038F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382D34C2_2_0382D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038452A02_2_038452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B2C02_2_0385B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E12ED2_2_038E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384B1B02_2_0384B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387516C2_2_0387516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382F1722_2_0382F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390B16B2_2_0390B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EF0CC2_2_038EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038470C02_2_038470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F70E92_2_038F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF0E02_2_038FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF7B02_2_038FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F16CC2_2_038F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038856302_2_03885630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DD5B02_2_038DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039095C32_2_039095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F75712_2_038F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FF43F2_2_038FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038314602_2_03831460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FB802_2_0385FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B5BF02_2_038B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387DBF92_2_0387DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFB762_2_038FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DDAAC2_2_038DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03885AA02_2_03885AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E1AA32_2_038E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EDAC62_2_038EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFA492_2_038FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7A462_2_038F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B3A6C2_2_038B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D59102_2_038D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038499502_2_03849950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385B9502_2_0385B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038438E02_2_038438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AD8002_2_038AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03841F922_2_03841F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFFB12_2_038FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD22_2_03803FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03803FD52_2_03803FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFF092_2_038FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03849EB02_2_03849EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385FDC02_2_0385FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03843D402_2_03843D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F1D5A2_2_038F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F7D732_2_038F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FFCF22_2_038FFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B9C322_2_038B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 111 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: String function: 004115D7 appears 36 times
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: String function: 00416C70 appears 39 times
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: String function: 00445AE0 appears 55 times
          Source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2115830610.0000000004733000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs TT 0205O241694086-CREDIT001.exe
          Source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2114297082.00000000048DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs TT 0205O241694086-CREDIT001.exe
          Source: TT 0205O241694086-CREDIT001.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal92.troj.evad.winEXE@3/1@0/0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeFile created: C:\Users\user\AppData\Local\Temp\HalithersesJump to behavior
          Source: TT 0205O241694086-CREDIT001.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: TT 0205O241694086-CREDIT001.exeReversingLabs: Detection: 66%
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeFile read: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"Jump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: msdart.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: TT 0205O241694086-CREDIT001.exeStatic file information: File size 1357957 > 1048576
          Source: Binary string: wntdll.pdbUGP source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2119119653.0000000004610000.00000004.00001000.00020000.00000000.sdmp, TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2122152165.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2447029624.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2445191237.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.000000000399E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2119119653.0000000004610000.00000004.00001000.00020000.00000000.sdmp, TT 0205O241694086-CREDIT001.exe, 00000000.00000003.2122152165.00000000047B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2484272630.0000000003800000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2447029624.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2445191237.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2484272630.000000000399E000.00000040.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: TT 0205O241694086-CREDIT001.exeStatic PE information: real checksum: 0xa961f should be: 0x153bd0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414856 pushfd ; ret 2_2_00414857
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E83D push es; retf 2_2_0041E84D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040717F push 00000019h; iretd 2_2_0040719C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004061B5 push esp; ret 2_2_004061BB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403240 push eax; ret 2_2_00403242
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412268 push ds; retf 2_2_0041226D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041222B push ss; iretd 2_2_00412293
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041AAF3 push esi; iretd 2_2_0041AAFA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00412285 push ss; iretd 2_2_00412293
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404BA0 pushad ; ret 2_2_00404BA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00426D33 push edi; retf 2_2_00426D3C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418DBC push eax; iretd 2_2_00418DC1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401E4C push BCBDF130h; retf 2_2_00401EB7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401E3E push esi; iretd 2_2_00401E49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E74D pushfd ; iretd 2_2_0041E74E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401F00 push BCBDF130h; retf 2_2_00401EB7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004177EE push edi; iretd 2_2_004177FC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004177F3 push edi; iretd 2_2_004177FC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004147F2 pushad ; iretd 2_2_004147FA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380225F pushad ; ret 2_2_038027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038027FA pushad ; ret 2_2_038027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD push ecx; mov dword ptr [esp], ecx2_2_038309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380283D push eax; iretd 2_2_03802858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03801368 push eax; iretd 2_2_03801369
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeAPI/Special instruction interceptor: Address: 41A8AD4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87596
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeAPI coverage: 3.8 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 6392Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeAPI call chain: ExitProcess graph end nodegraph_0-86720
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E rdtsc 2_2_0387096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417773 LdrLoadDll,2_2_00417773
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A5538 mov eax, dword ptr fs:[00000030h]0_2_041A5538
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A5598 mov eax, dword ptr fs:[00000030h]0_2_041A5598
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A76D0 mov eax, dword ptr fs:[00000030h]0_2_041A76D0
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A8D40 mov eax, dword ptr fs:[00000030h]0_2_041A8D40
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_041A8DA0 mov eax, dword ptr fs:[00000030h]0_2_041A8DA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E388 mov eax, dword ptr fs:[00000030h]2_2_0382E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385438F mov eax, dword ptr fs:[00000030h]2_2_0385438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828397 mov eax, dword ptr fs:[00000030h]2_2_03828397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC3CD mov eax, dword ptr fs:[00000030h]2_2_038EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A3C0 mov eax, dword ptr fs:[00000030h]2_2_0383A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038383C0 mov eax, dword ptr fs:[00000030h]2_2_038383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B63C0 mov eax, dword ptr fs:[00000030h]2_2_038B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov ecx, dword ptr fs:[00000030h]2_2_038DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE3DB mov eax, dword ptr fs:[00000030h]2_2_038DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D43D4 mov eax, dword ptr fs:[00000030h]2_2_038D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038403E9 mov eax, dword ptr fs:[00000030h]2_2_038403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E3F0 mov eax, dword ptr fs:[00000030h]2_2_0384E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038663FF mov eax, dword ptr fs:[00000030h]2_2_038663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A30B mov eax, dword ptr fs:[00000030h]2_2_0386A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C310 mov ecx, dword ptr fs:[00000030h]2_2_0382C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850310 mov ecx, dword ptr fs:[00000030h]2_2_03850310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov ecx, dword ptr fs:[00000030h]2_2_03908324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03908324 mov eax, dword ptr fs:[00000030h]2_2_03908324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B2349 mov eax, dword ptr fs:[00000030h]2_2_038B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov ecx, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B035C mov eax, dword ptr fs:[00000030h]2_2_038B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA352 mov eax, dword ptr fs:[00000030h]2_2_038FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8350 mov ecx, dword ptr fs:[00000030h]2_2_038D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390634F mov eax, dword ptr fs:[00000030h]2_2_0390634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D437C mov eax, dword ptr fs:[00000030h]2_2_038D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E284 mov eax, dword ptr fs:[00000030h]2_2_0386E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0283 mov eax, dword ptr fs:[00000030h]2_2_038B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402A0 mov eax, dword ptr fs:[00000030h]2_2_038402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov ecx, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C62A0 mov eax, dword ptr fs:[00000030h]2_2_038C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A2C3 mov eax, dword ptr fs:[00000030h]2_2_0383A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039062D6 mov eax, dword ptr fs:[00000030h]2_2_039062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038402E1 mov eax, dword ptr fs:[00000030h]2_2_038402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382823B mov eax, dword ptr fs:[00000030h]2_2_0382823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov eax, dword ptr fs:[00000030h]2_2_038B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B8243 mov ecx, dword ptr fs:[00000030h]2_2_038B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390625D mov eax, dword ptr fs:[00000030h]2_2_0390625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A250 mov eax, dword ptr fs:[00000030h]2_2_0382A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836259 mov eax, dword ptr fs:[00000030h]2_2_03836259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA250 mov eax, dword ptr fs:[00000030h]2_2_038EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834260 mov eax, dword ptr fs:[00000030h]2_2_03834260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382826B mov eax, dword ptr fs:[00000030h]2_2_0382826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E0274 mov eax, dword ptr fs:[00000030h]2_2_038E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03870185 mov eax, dword ptr fs:[00000030h]2_2_03870185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EC188 mov eax, dword ptr fs:[00000030h]2_2_038EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4180 mov eax, dword ptr fs:[00000030h]2_2_038D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B019F mov eax, dword ptr fs:[00000030h]2_2_038B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A197 mov eax, dword ptr fs:[00000030h]2_2_0382A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F61C3 mov eax, dword ptr fs:[00000030h]2_2_038F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_038AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE1D0 mov eax, dword ptr fs:[00000030h]2_2_038AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039061E5 mov eax, dword ptr fs:[00000030h]2_2_039061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038601F8 mov eax, dword ptr fs:[00000030h]2_2_038601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov eax, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DE10E mov ecx, dword ptr fs:[00000030h]2_2_038DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov ecx, dword ptr fs:[00000030h]2_2_038DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DA118 mov eax, dword ptr fs:[00000030h]2_2_038DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F0115 mov eax, dword ptr fs:[00000030h]2_2_038F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860124 mov eax, dword ptr fs:[00000030h]2_2_03860124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov ecx, dword ptr fs:[00000030h]2_2_038C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C4144 mov eax, dword ptr fs:[00000030h]2_2_038C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C156 mov eax, dword ptr fs:[00000030h]2_2_0382C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C8158 mov eax, dword ptr fs:[00000030h]2_2_038C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836154 mov eax, dword ptr fs:[00000030h]2_2_03836154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904164 mov eax, dword ptr fs:[00000030h]2_2_03904164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383208A mov eax, dword ptr fs:[00000030h]2_2_0383208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038280A0 mov eax, dword ptr fs:[00000030h]2_2_038280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C80A8 mov eax, dword ptr fs:[00000030h]2_2_038C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov eax, dword ptr fs:[00000030h]2_2_038F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F60B8 mov ecx, dword ptr fs:[00000030h]2_2_038F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B20DE mov eax, dword ptr fs:[00000030h]2_2_038B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0382A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038380E9 mov eax, dword ptr fs:[00000030h]2_2_038380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B60E0 mov eax, dword ptr fs:[00000030h]2_2_038B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C0F0 mov eax, dword ptr fs:[00000030h]2_2_0382C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038720F0 mov ecx, dword ptr fs:[00000030h]2_2_038720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4000 mov ecx, dword ptr fs:[00000030h]2_2_038B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D2000 mov eax, dword ptr fs:[00000030h]2_2_038D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E016 mov eax, dword ptr fs:[00000030h]2_2_0384E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382A020 mov eax, dword ptr fs:[00000030h]2_2_0382A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C020 mov eax, dword ptr fs:[00000030h]2_2_0382C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6030 mov eax, dword ptr fs:[00000030h]2_2_038C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832050 mov eax, dword ptr fs:[00000030h]2_2_03832050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6050 mov eax, dword ptr fs:[00000030h]2_2_038B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385C073 mov eax, dword ptr fs:[00000030h]2_2_0385C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D678E mov eax, dword ptr fs:[00000030h]2_2_038D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038307AF mov eax, dword ptr fs:[00000030h]2_2_038307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E47A0 mov eax, dword ptr fs:[00000030h]2_2_038E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383C7C0 mov eax, dword ptr fs:[00000030h]2_2_0383C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B07C3 mov eax, dword ptr fs:[00000030h]2_2_038B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038527ED mov eax, dword ptr fs:[00000030h]2_2_038527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE7E1 mov eax, dword ptr fs:[00000030h]2_2_038BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038347FB mov eax, dword ptr fs:[00000030h]2_2_038347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C700 mov eax, dword ptr fs:[00000030h]2_2_0386C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830710 mov eax, dword ptr fs:[00000030h]2_2_03830710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03860710 mov eax, dword ptr fs:[00000030h]2_2_03860710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C720 mov eax, dword ptr fs:[00000030h]2_2_0386C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov ecx, dword ptr fs:[00000030h]2_2_0386273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386273C mov eax, dword ptr fs:[00000030h]2_2_0386273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AC730 mov eax, dword ptr fs:[00000030h]2_2_038AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov esi, dword ptr fs:[00000030h]2_2_0386674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386674D mov eax, dword ptr fs:[00000030h]2_2_0386674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830750 mov eax, dword ptr fs:[00000030h]2_2_03830750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE75D mov eax, dword ptr fs:[00000030h]2_2_038BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872750 mov eax, dword ptr fs:[00000030h]2_2_03872750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B4755 mov eax, dword ptr fs:[00000030h]2_2_038B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838770 mov eax, dword ptr fs:[00000030h]2_2_03838770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840770 mov eax, dword ptr fs:[00000030h]2_2_03840770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03834690 mov eax, dword ptr fs:[00000030h]2_2_03834690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C6A6 mov eax, dword ptr fs:[00000030h]2_2_0386C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038666B0 mov eax, dword ptr fs:[00000030h]2_2_038666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0386A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A6C7 mov eax, dword ptr fs:[00000030h]2_2_0386A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE6F2 mov eax, dword ptr fs:[00000030h]2_2_038AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B06F1 mov eax, dword ptr fs:[00000030h]2_2_038B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE609 mov eax, dword ptr fs:[00000030h]2_2_038AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384260B mov eax, dword ptr fs:[00000030h]2_2_0384260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03872619 mov eax, dword ptr fs:[00000030h]2_2_03872619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384E627 mov eax, dword ptr fs:[00000030h]2_2_0384E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03866620 mov eax, dword ptr fs:[00000030h]2_2_03866620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868620 mov eax, dword ptr fs:[00000030h]2_2_03868620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383262C mov eax, dword ptr fs:[00000030h]2_2_0383262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0384C640 mov eax, dword ptr fs:[00000030h]2_2_0384C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F866E mov eax, dword ptr fs:[00000030h]2_2_038F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A660 mov eax, dword ptr fs:[00000030h]2_2_0386A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03862674 mov eax, dword ptr fs:[00000030h]2_2_03862674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov eax, dword ptr fs:[00000030h]2_2_03832582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03832582 mov ecx, dword ptr fs:[00000030h]2_2_03832582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864588 mov eax, dword ptr fs:[00000030h]2_2_03864588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E59C mov eax, dword ptr fs:[00000030h]2_2_0386E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B05A7 mov eax, dword ptr fs:[00000030h]2_2_038B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038545B1 mov eax, dword ptr fs:[00000030h]2_2_038545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E5CF mov eax, dword ptr fs:[00000030h]2_2_0386E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038365D0 mov eax, dword ptr fs:[00000030h]2_2_038365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A5D0 mov eax, dword ptr fs:[00000030h]2_2_0386A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E5E7 mov eax, dword ptr fs:[00000030h]2_2_0385E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038325E0 mov eax, dword ptr fs:[00000030h]2_2_038325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C5ED mov eax, dword ptr fs:[00000030h]2_2_0386C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6500 mov eax, dword ptr fs:[00000030h]2_2_038C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904500 mov eax, dword ptr fs:[00000030h]2_2_03904500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840535 mov eax, dword ptr fs:[00000030h]2_2_03840535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E53E mov eax, dword ptr fs:[00000030h]2_2_0385E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838550 mov eax, dword ptr fs:[00000030h]2_2_03838550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386656A mov eax, dword ptr fs:[00000030h]2_2_0386656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA49A mov eax, dword ptr fs:[00000030h]2_2_038EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038364AB mov eax, dword ptr fs:[00000030h]2_2_038364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038644B0 mov ecx, dword ptr fs:[00000030h]2_2_038644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BA4B0 mov eax, dword ptr fs:[00000030h]2_2_038BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038304E5 mov ecx, dword ptr fs:[00000030h]2_2_038304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868402 mov eax, dword ptr fs:[00000030h]2_2_03868402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382E420 mov eax, dword ptr fs:[00000030h]2_2_0382E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382C427 mov eax, dword ptr fs:[00000030h]2_2_0382C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B6420 mov eax, dword ptr fs:[00000030h]2_2_038B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386A430 mov eax, dword ptr fs:[00000030h]2_2_0386A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386E443 mov eax, dword ptr fs:[00000030h]2_2_0386E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038EA456 mov eax, dword ptr fs:[00000030h]2_2_038EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382645D mov eax, dword ptr fs:[00000030h]2_2_0382645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385245A mov eax, dword ptr fs:[00000030h]2_2_0385245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC460 mov ecx, dword ptr fs:[00000030h]2_2_038BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385A470 mov eax, dword ptr fs:[00000030h]2_2_0385A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840BBE mov eax, dword ptr fs:[00000030h]2_2_03840BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4BB0 mov eax, dword ptr fs:[00000030h]2_2_038E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03850BCB mov eax, dword ptr fs:[00000030h]2_2_03850BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830BCD mov eax, dword ptr fs:[00000030h]2_2_03830BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEBD0 mov eax, dword ptr fs:[00000030h]2_2_038DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838BF0 mov eax, dword ptr fs:[00000030h]2_2_03838BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EBFC mov eax, dword ptr fs:[00000030h]2_2_0385EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCBF0 mov eax, dword ptr fs:[00000030h]2_2_038BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904B00 mov eax, dword ptr fs:[00000030h]2_2_03904B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AEB1D mov eax, dword ptr fs:[00000030h]2_2_038AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EB20 mov eax, dword ptr fs:[00000030h]2_2_0385EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038F8B28 mov eax, dword ptr fs:[00000030h]2_2_038F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038E4B4B mov eax, dword ptr fs:[00000030h]2_2_038E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03902B57 mov eax, dword ptr fs:[00000030h]2_2_03902B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C6B40 mov eax, dword ptr fs:[00000030h]2_2_038C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FAB40 mov eax, dword ptr fs:[00000030h]2_2_038FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D8B42 mov eax, dword ptr fs:[00000030h]2_2_038D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828B50 mov eax, dword ptr fs:[00000030h]2_2_03828B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEB50 mov eax, dword ptr fs:[00000030h]2_2_038DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0382CB7E mov eax, dword ptr fs:[00000030h]2_2_0382CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383EA80 mov eax, dword ptr fs:[00000030h]2_2_0383EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904A80 mov eax, dword ptr fs:[00000030h]2_2_03904A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03868A90 mov edx, dword ptr fs:[00000030h]2_2_03868A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03838AA0 mov eax, dword ptr fs:[00000030h]2_2_03838AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886AA4 mov eax, dword ptr fs:[00000030h]2_2_03886AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03886ACC mov eax, dword ptr fs:[00000030h]2_2_03886ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830AD0 mov eax, dword ptr fs:[00000030h]2_2_03830AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03864AD0 mov eax, dword ptr fs:[00000030h]2_2_03864AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386AAEE mov eax, dword ptr fs:[00000030h]2_2_0386AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BCA11 mov eax, dword ptr fs:[00000030h]2_2_038BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA24 mov eax, dword ptr fs:[00000030h]2_2_0386CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385EA2E mov eax, dword ptr fs:[00000030h]2_2_0385EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03854A35 mov eax, dword ptr fs:[00000030h]2_2_03854A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA38 mov eax, dword ptr fs:[00000030h]2_2_0386CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03836A50 mov eax, dword ptr fs:[00000030h]2_2_03836A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03840A5B mov eax, dword ptr fs:[00000030h]2_2_03840A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386CA6F mov eax, dword ptr fs:[00000030h]2_2_0386CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038DEA60 mov eax, dword ptr fs:[00000030h]2_2_038DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038ACA72 mov eax, dword ptr fs:[00000030h]2_2_038ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038429A0 mov eax, dword ptr fs:[00000030h]2_2_038429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038309AD mov eax, dword ptr fs:[00000030h]2_2_038309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov esi, dword ptr fs:[00000030h]2_2_038B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B89B3 mov eax, dword ptr fs:[00000030h]2_2_038B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C69C0 mov eax, dword ptr fs:[00000030h]2_2_038C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0383A9D0 mov eax, dword ptr fs:[00000030h]2_2_0383A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038649D0 mov eax, dword ptr fs:[00000030h]2_2_038649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA9D3 mov eax, dword ptr fs:[00000030h]2_2_038FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BE9E0 mov eax, dword ptr fs:[00000030h]2_2_038BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038629F9 mov eax, dword ptr fs:[00000030h]2_2_038629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038AE908 mov eax, dword ptr fs:[00000030h]2_2_038AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC912 mov eax, dword ptr fs:[00000030h]2_2_038BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03828918 mov eax, dword ptr fs:[00000030h]2_2_03828918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B892A mov eax, dword ptr fs:[00000030h]2_2_038B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038C892B mov eax, dword ptr fs:[00000030h]2_2_038C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038B0946 mov eax, dword ptr fs:[00000030h]2_2_038B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03904940 mov eax, dword ptr fs:[00000030h]2_2_03904940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03856962 mov eax, dword ptr fs:[00000030h]2_2_03856962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov edx, dword ptr fs:[00000030h]2_2_0387096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0387096E mov eax, dword ptr fs:[00000030h]2_2_0387096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038D4978 mov eax, dword ptr fs:[00000030h]2_2_038D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC97C mov eax, dword ptr fs:[00000030h]2_2_038BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03830887 mov eax, dword ptr fs:[00000030h]2_2_03830887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC89D mov eax, dword ptr fs:[00000030h]2_2_038BC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0385E8C0 mov eax, dword ptr fs:[00000030h]2_2_0385E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039008C0 mov eax, dword ptr fs:[00000030h]2_2_039008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038FA8E4 mov eax, dword ptr fs:[00000030h]2_2_038FA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0386C8F9 mov eax, dword ptr fs:[00000030h]2_2_0386C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038BC810 mov eax, dword ptr fs:[00000030h]2_2_038BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03852835 mov eax, dword ptr fs:[00000030h]2_2_03852835
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: ACD008Jump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"Jump to behavior
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: Shell_TrayWnd
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,0_2_0041E364
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: WIN_XP
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: WIN_XPe
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: WIN_VISTA
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: WIN_7
          Source: TT 0205O241694086-CREDIT001.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
          Source: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory14
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem2
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow15
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          TT 0205O241694086-CREDIT001.exe67%ReversingLabsWin32.Worm.DorkBot
          TT 0205O241694086-CREDIT001.exe100%AviraHEUR/AGEN.1321671
          TT 0205O241694086-CREDIT001.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1519459
          Start date and time:2024-09-26 15:16:59 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 20s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:TT 0205O241694086-CREDIT001.exe
          Detection:MAL
          Classification:mal92.troj.evad.winEXE@3/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 55
          • Number of non-executed functions: 303
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • VT rate limit hit for: TT 0205O241694086-CREDIT001.exe
          TimeTypeDescription
          09:18:32API Interceptor3x Sleep call for process: svchost.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
          File Type:data
          Category:dropped
          Size (bytes):288768
          Entropy (8bit):7.995431635499161
          Encrypted:true
          SSDEEP:6144:uLjfB457r/M1DNMAU98e/0Z+1tHKz3S8kmHVUHrC/C2:uLjfBuENc98buHm3kmGG/C2
          MD5:921908EB4999D12699001D5AE0B79001
          SHA1:16815AA31930CFA737A2C45F11000A758ADB0439
          SHA-256:806D5D59A531DBE71118F7728BE8D928510719B256FA569F9DA26A71F5B42066
          SHA-512:BA5355A3D50936CDA4D2427D1868D518EA81E82F646E3DDE6719D633CA255B5E24699A5EF0954990F193149D7F7BA5214896A5F900688E6DCA505F66995C5E83
          Malicious:false
          Reputation:low
          Preview:uj...H6NY..Y.....F1...nR0..80AZBH6NYPZVPL3WC5TF2N63FQ87BZ.0AZLW.@Y.S.q.2.....[=.C4>_E#7.S 4,'Bn;5z$%".>-...an[\"4.:OP.0AZBH6N QS.m,T.~U3...Q.\...x:_.[....>.@....7$../Q&.S!.87BZ80AZ..6N.Q[V..S.C5TF2N63.Q:6I[30A.FH6NYPZVPLSCC5TV2N6CBQ87.Z8 AZBJ6N_PZVPL3WE5TF2N63F!<7BX80AZBH4N..ZV@L3GC5TF"N6#FQ87BZ(0AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZV~8V/75TFv.23FA87B.<0AJBH6NYPZVPL3WC5tF2.63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYPZVPL3WC5TF2N63FQ87BZ80AZBH6NYP
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.538652085549316
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:TT 0205O241694086-CREDIT001.exe
          File size:1'357'957 bytes
          MD5:b4e2e1f10ea0a5ac94f8578464d28c85
          SHA1:a4ef5347b3e986694078fd98f217e6daa1dd8dad
          SHA256:8750d7bb299badc971fa5a607936d4feb49b584e70ba7dd8b874bd3a8cf13ac9
          SHA512:34051ab53948ba4b10abbeac01220da5d16cac40477909656bbd4cfbc157da3eb2da082a7e11b56365fd7a0fdac567acb0f6a3b5ab1bf985210aaa6949506722
          SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCV67J0iJfsboZ09hSOg/vEhpTTF1uCRC:7JZoQrbTFZY1iaCcyiJEboZGhSOg4pfW
          TLSH:5455F121B5C69036C2F323B09E7FF76A963D69360326D1D727C82E225E605416B2E773
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
          Icon Hash:1733312925935517
          Entrypoint:0x4165c1
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:0
          File Version Major:5
          File Version Minor:0
          Subsystem Version Major:5
          Subsystem Version Minor:0
          Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
          Instruction
          call 00007FFAC89CF6CBh
          jmp 00007FFAC89C653Eh
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          push edi
          push esi
          mov esi, dword ptr [ebp+0Ch]
          mov ecx, dword ptr [ebp+10h]
          mov edi, dword ptr [ebp+08h]
          mov eax, ecx
          mov edx, ecx
          add eax, esi
          cmp edi, esi
          jbe 00007FFAC89C66BAh
          cmp edi, eax
          jc 00007FFAC89C6856h
          cmp ecx, 00000080h
          jc 00007FFAC89C66CEh
          cmp dword ptr [004A9724h], 00000000h
          je 00007FFAC89C66C5h
          push edi
          push esi
          and edi, 0Fh
          and esi, 0Fh
          cmp edi, esi
          pop esi
          pop edi
          jne 00007FFAC89C66B7h
          jmp 00007FFAC89C6A92h
          test edi, 00000003h
          jne 00007FFAC89C66C6h
          shr ecx, 02h
          and edx, 03h
          cmp ecx, 08h
          jc 00007FFAC89C66DBh
          rep movsd
          jmp dword ptr [00416740h+edx*4]
          mov eax, edi
          mov edx, 00000003h
          sub ecx, 04h
          jc 00007FFAC89C66BEh
          and eax, 03h
          add ecx, eax
          jmp dword ptr [00416654h+eax*4]
          jmp dword ptr [00416750h+ecx*4]
          nop
          jmp dword ptr [004166D4h+ecx*4]
          nop
          inc cx
          add byte ptr [eax-4BFFBE9Ah], dl
          inc cx
          add byte ptr [ebx], ah
          ror dword ptr [edx-75F877FAh], 1
          inc esi
          add dword ptr [eax+468A0147h], ecx
          add al, cl
          jmp 00007FFACAE3EEB7h
          add esi, 03h
          add edi, 03h
          cmp ecx, 08h
          jc 00007FFAC89C667Eh
          rep movsd
          jmp dword ptr [00000000h+edx*4]
          Programming Language:
          • [ C ] VS2010 SP1 build 40219
          • [C++] VS2010 SP1 build 40219
          • [ C ] VS2008 SP1 build 30729
          • [IMP] VS2008 SP1 build 30729
          • [ASM] VS2010 SP1 build 40219
          • [RES] VS2010 SP1 build 40219
          • [LNK] VS2010 SP1 build 40219
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
          RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
          RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
          RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
          RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
          RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
          RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
          RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
          RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
          RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
          RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
          RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
          RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
          RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
          RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
          RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
          RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
          RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
          RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
          RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
          RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
          RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
          RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
          RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
          RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
          RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
          RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
          DLLImport
          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
          USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
          GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
          OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
          Language of compilation systemCountry where language is spokenMap
          EnglishGreat Britain
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:09:17:50
          Start date:26/09/2024
          Path:C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"
          Imagebase:0x400000
          File size:1'357'957 bytes
          MD5 hash:B4E2E1F10EA0A5AC94F8578464D28C85
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:2
          Start time:09:17:57
          Start date:26/09/2024
          Path:C:\Windows\SysWOW64\svchost.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe"
          Imagebase:0xfe0000
          File size:46'504 bytes
          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2483937457.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2484243476.0000000003600000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:3.6%
            Dynamic/Decrypted Code Coverage:1.5%
            Signature Coverage:9.6%
            Total number of Nodes:2000
            Total number of Limit Nodes:35
            execution_graph 86096 4010e0 86099 401100 86096->86099 86098 4010f8 86100 401113 86099->86100 86101 401120 86100->86101 86102 401184 86100->86102 86103 40114c 86100->86103 86133 401182 86100->86133 86104 40112c DefWindowProcW 86101->86104 86158 401000 Shell_NotifyIconW __gmtime64_s 86101->86158 86137 401250 86102->86137 86105 401151 86103->86105 86106 40119d 86103->86106 86104->86098 86109 401219 86105->86109 86110 40115d 86105->86110 86108 42afb4 86106->86108 86111 4011a3 86106->86111 86153 40f190 10 API calls 86108->86153 86109->86101 86114 401225 86109->86114 86112 401163 86110->86112 86113 42b01d 86110->86113 86111->86101 86117 4011b6 KillTimer 86111->86117 86118 4011db SetTimer RegisterWindowMessageW 86111->86118 86119 42afe9 86112->86119 86120 40116c 86112->86120 86113->86104 86157 4370f4 52 API calls 86113->86157 86169 468b0e 74 API calls __gmtime64_s 86114->86169 86152 401000 Shell_NotifyIconW __gmtime64_s 86117->86152 86121 401193 86118->86121 86126 401204 CreatePopupMenu 86118->86126 86155 40f190 10 API calls 86119->86155 86120->86101 86128 401174 86120->86128 86121->86098 86122 42b04f 86159 40e0c0 86122->86159 86126->86098 86154 45fd57 65 API calls __gmtime64_s 86128->86154 86130 42afe4 86130->86121 86131 42b00e 86156 401a50 330 API calls 86131->86156 86132 4011c9 PostQuitMessage 86132->86098 86133->86104 86136 42afdc 86136->86104 86136->86130 86138 401262 __gmtime64_s 86137->86138 86139 4012e8 86137->86139 86170 401b80 86138->86170 86139->86121 86141 40128c 86142 4012d1 KillTimer SetTimer 86141->86142 86143 4012bb 86141->86143 86144 4272ec 86141->86144 86142->86139 86145 4012c5 86143->86145 86146 42733f 86143->86146 86147 4272f4 Shell_NotifyIconW 86144->86147 86148 42731a Shell_NotifyIconW 86144->86148 86145->86142 86149 427393 Shell_NotifyIconW 86145->86149 86150 427348 Shell_NotifyIconW 86146->86150 86151 42736e Shell_NotifyIconW 86146->86151 86147->86142 86148->86142 86149->86142 86150->86142 86151->86142 86152->86132 86153->86121 86154->86136 86155->86131 86156->86133 86157->86133 86158->86122 86161 40e0e7 __gmtime64_s 86159->86161 86160 40e142 86163 40e184 86160->86163 86268 4341e6 63 API calls __wcsicoll 86160->86268 86161->86160 86162 42729f DestroyIcon 86161->86162 86162->86160 86165 40e1a0 Shell_NotifyIconW 86163->86165 86166 4272db Shell_NotifyIconW 86163->86166 86167 401b80 54 API calls 86165->86167 86168 40e1ba 86167->86168 86168->86133 86169->86130 86171 401b9c 86170->86171 86191 401c7e 86170->86191 86192 4013c0 86171->86192 86174 42722b LoadStringW 86177 427246 86174->86177 86175 401bb9 86197 402160 86175->86197 86211 40e0a0 86177->86211 86178 401bcd 86180 427258 86178->86180 86181 401bda 86178->86181 86215 40d200 52 API calls 2 library calls 86180->86215 86181->86177 86182 401be4 86181->86182 86210 40d200 52 API calls 2 library calls 86182->86210 86185 427267 86186 401bf3 __gmtime64_s _wcscpy _wcsncpy 86185->86186 86187 42727b 86185->86187 86190 401c62 Shell_NotifyIconW 86186->86190 86216 40d200 52 API calls 2 library calls 86187->86216 86189 427289 86190->86191 86191->86141 86217 4115d7 86192->86217 86198 426daa 86197->86198 86199 40216b _wcslen 86197->86199 86255 40c600 86198->86255 86202 402180 86199->86202 86203 40219e 86199->86203 86201 426db5 86201->86178 86254 403bd0 52 API calls moneypunct 86202->86254 86205 4013a0 52 API calls 86203->86205 86207 4021a5 86205->86207 86206 402187 _memmove 86206->86178 86208 426db7 86207->86208 86209 4115d7 52 API calls 86207->86209 86209->86206 86210->86186 86212 40e0b2 86211->86212 86213 40e0a8 86211->86213 86212->86186 86267 403c30 52 API calls _memmove 86213->86267 86215->86185 86216->86189 86219 4115e1 _malloc 86217->86219 86220 4013e4 86219->86220 86224 4115fd std::exception::exception 86219->86224 86231 4135bb 86219->86231 86228 4013a0 86220->86228 86221 41163b 86246 4180af 46 API calls std::exception::operator= 86221->86246 86223 411645 86247 418105 RaiseException 86223->86247 86224->86221 86245 41130a 51 API calls __cinit 86224->86245 86227 411656 86229 4115d7 52 API calls 86228->86229 86230 4013a7 86229->86230 86230->86174 86230->86175 86232 413638 _malloc 86231->86232 86238 4135c9 _malloc 86231->86238 86253 417f77 46 API calls __getptd_noexit 86232->86253 86235 4135f7 RtlAllocateHeap 86235->86238 86244 413630 86235->86244 86237 413624 86251 417f77 46 API calls __getptd_noexit 86237->86251 86238->86235 86238->86237 86241 4135d4 86238->86241 86242 413622 86238->86242 86241->86238 86248 418901 46 API calls __NMSG_WRITE 86241->86248 86249 418752 46 API calls 8 library calls 86241->86249 86250 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86241->86250 86252 417f77 46 API calls __getptd_noexit 86242->86252 86244->86219 86245->86221 86246->86223 86247->86227 86248->86241 86249->86241 86251->86242 86252->86244 86253->86244 86254->86206 86256 40c619 86255->86256 86257 40c60a 86255->86257 86256->86201 86257->86256 86260 4026f0 86257->86260 86259 426d7a _memmove 86259->86201 86261 426873 86260->86261 86262 4026ff 86260->86262 86263 4013a0 52 API calls 86261->86263 86262->86259 86264 42687b 86263->86264 86265 4115d7 52 API calls 86264->86265 86266 42689e _memmove 86265->86266 86266->86259 86267->86212 86268->86163 86269 40bd20 86270 428194 86269->86270 86271 40bd2d 86269->86271 86273 40bd43 86270->86273 86275 4281bc 86270->86275 86278 4281b2 86270->86278 86272 40bd37 86271->86272 86292 4531b1 85 API calls 5 library calls 86271->86292 86281 40bd50 86272->86281 86291 45e987 86 API calls moneypunct 86275->86291 86290 40b510 VariantClear 86278->86290 86280 4281ba 86282 426cf1 86281->86282 86283 40bd63 86281->86283 86302 44cde9 52 API calls _memmove 86282->86302 86293 40bd80 86283->86293 86286 426cfc 86288 40e0a0 52 API calls 86286->86288 86287 40bd73 86287->86273 86289 426d02 86288->86289 86290->86280 86291->86271 86292->86272 86294 40bd8e 86293->86294 86298 40bdb7 _memmove 86293->86298 86295 40bded 86294->86295 86296 40bdad 86294->86296 86294->86298 86299 4115d7 52 API calls 86295->86299 86303 402f00 86296->86303 86298->86287 86300 40bdf6 86299->86300 86300->86298 86301 4115d7 52 API calls 86300->86301 86301->86298 86302->86286 86304 402f10 86303->86304 86305 402f0c 86303->86305 86306 4115d7 52 API calls 86304->86306 86307 4268c3 86304->86307 86305->86298 86308 402f51 moneypunct _memmove 86306->86308 86308->86298 86309 425ba2 86314 40e360 86309->86314 86311 425bb4 86330 41130a 51 API calls __cinit 86311->86330 86313 425bbe 86315 4115d7 52 API calls 86314->86315 86316 40e3ec GetModuleFileNameW 86315->86316 86331 413a0e 86316->86331 86318 40e421 _wcsncat 86334 413a9e 86318->86334 86321 4115d7 52 API calls 86322 40e45e _wcscpy 86321->86322 86337 40bc70 86322->86337 86326 40e4a9 86326->86311 86327 401c90 52 API calls 86329 40e4a1 _wcscat _wcslen _wcsncpy 86327->86329 86328 4115d7 52 API calls 86328->86329 86329->86326 86329->86327 86329->86328 86330->86313 86356 413801 86331->86356 86386 419efd 86334->86386 86338 4115d7 52 API calls 86337->86338 86339 40bc98 86338->86339 86340 4115d7 52 API calls 86339->86340 86341 40bca6 86340->86341 86342 40e4c0 86341->86342 86398 403350 86342->86398 86344 40e4cb RegOpenKeyExW 86345 427190 RegQueryValueExW 86344->86345 86346 40e4eb 86344->86346 86347 4271b0 86345->86347 86348 42721a RegCloseKey 86345->86348 86346->86329 86349 4115d7 52 API calls 86347->86349 86348->86329 86350 4271cb 86349->86350 86405 43652f 52 API calls 86350->86405 86352 4271d8 RegQueryValueExW 86353 4271f7 86352->86353 86355 42720e 86352->86355 86354 402160 52 API calls 86353->86354 86354->86355 86355->86348 86357 41389e 86356->86357 86365 41381a 86356->86365 86358 4139e8 86357->86358 86360 413a00 86357->86360 86383 417f77 46 API calls __getptd_noexit 86358->86383 86385 417f77 46 API calls __getptd_noexit 86360->86385 86361 4139ed 86384 417f25 10 API calls __vswprintf_l 86361->86384 86364 413967 86364->86318 86365->86357 86369 41388a 86365->86369 86378 419e30 46 API calls __vswprintf_l 86365->86378 86367 41396c 86367->86357 86367->86364 86370 41397a 86367->86370 86368 413929 86368->86357 86371 413945 86368->86371 86380 419e30 46 API calls __vswprintf_l 86368->86380 86369->86357 86377 413909 86369->86377 86379 419e30 46 API calls __vswprintf_l 86369->86379 86382 419e30 46 API calls __vswprintf_l 86370->86382 86371->86357 86371->86364 86374 41395b 86371->86374 86381 419e30 46 API calls __vswprintf_l 86374->86381 86377->86367 86377->86368 86378->86369 86379->86377 86380->86371 86381->86364 86382->86364 86383->86361 86384->86364 86385->86364 86387 419f13 86386->86387 86388 419f0e 86386->86388 86395 417f77 46 API calls __getptd_noexit 86387->86395 86388->86387 86389 419f2b 86388->86389 86393 40e454 86389->86393 86397 417f77 46 API calls __getptd_noexit 86389->86397 86393->86321 86394 419f18 86396 417f25 10 API calls __vswprintf_l 86394->86396 86395->86394 86396->86393 86397->86394 86399 403367 86398->86399 86400 403358 86398->86400 86401 4115d7 52 API calls 86399->86401 86400->86344 86402 403370 86401->86402 86403 4115d7 52 API calls 86402->86403 86404 40339e 86403->86404 86404->86344 86405->86352 86406 41a81bb 86407 41a81c0 86406->86407 86415 41a5860 86407->86415 86409 41a81cc 86410 41a81ea 86409->86410 86411 41a8280 86409->86411 86418 41a7e90 86410->86418 86431 41a8b30 9 API calls 86411->86431 86414 41a8267 86432 41a8d40 GetPEB 86415->86432 86417 41a5eeb 86417->86409 86419 41a5860 GetPEB 86418->86419 86428 41a7f2f 86419->86428 86421 41a7f60 CreateFileW 86427 41a7f6d 86421->86427 86421->86428 86422 41a7f89 VirtualAlloc 86423 41a7faa ReadFile 86422->86423 86422->86427 86426 41a7fc8 VirtualAlloc 86423->86426 86423->86427 86424 41a818a 86424->86414 86425 41a817c VirtualFree 86425->86424 86426->86427 86426->86428 86427->86424 86427->86425 86428->86422 86428->86427 86429 41a8090 CloseHandle 86428->86429 86430 41a80a0 VirtualFree 86428->86430 86434 41a8da0 GetPEB 86428->86434 86429->86428 86430->86428 86431->86414 86433 41a8d6a 86432->86433 86433->86417 86435 41a8dca 86434->86435 86435->86421 86436 416454 86473 416c70 86436->86473 86438 416460 GetStartupInfoW 86439 416474 86438->86439 86474 419d5a HeapCreate 86439->86474 86441 4164cd 86442 4164d8 86441->86442 86558 41642b 46 API calls 3 library calls 86441->86558 86475 417c20 GetModuleHandleW 86442->86475 86445 4164de 86446 4164e9 __RTC_Initialize 86445->86446 86559 41642b 46 API calls 3 library calls 86445->86559 86494 41aaa1 GetStartupInfoW 86446->86494 86450 416503 GetCommandLineW 86507 41f584 GetEnvironmentStringsW 86450->86507 86454 416513 86513 41f4d6 GetModuleFileNameW 86454->86513 86456 41651d 86457 416528 86456->86457 86561 411924 46 API calls 3 library calls 86456->86561 86517 41f2a4 86457->86517 86460 41652e 86461 416539 86460->86461 86562 411924 46 API calls 3 library calls 86460->86562 86531 411703 86461->86531 86464 416541 86466 41654c __wwincmdln 86464->86466 86563 411924 46 API calls 3 library calls 86464->86563 86535 40d6b0 86466->86535 86469 41657c 86565 411906 46 API calls _doexit 86469->86565 86472 416581 _raise 86473->86438 86474->86441 86476 417c34 86475->86476 86477 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86475->86477 86566 4178ff 49 API calls _free 86476->86566 86478 417c87 TlsAlloc 86477->86478 86482 417cd5 TlsSetValue 86478->86482 86483 417d96 86478->86483 86481 417c39 86481->86445 86482->86483 86484 417ce6 __init_pointers 86482->86484 86483->86445 86567 418151 InitializeCriticalSectionAndSpinCount 86484->86567 86486 417d91 86575 4178ff 49 API calls _free 86486->86575 86488 417d2a 86488->86486 86568 416b49 86488->86568 86491 417d76 86574 41793c 46 API calls 4 library calls 86491->86574 86493 417d7e GetCurrentThreadId 86493->86483 86495 416b49 __calloc_crt 46 API calls 86494->86495 86497 41aabf 86495->86497 86496 41ac34 86498 41ac6a GetStdHandle 86496->86498 86500 41acce SetHandleCount 86496->86500 86502 41ac7c GetFileType 86496->86502 86506 41aca2 InitializeCriticalSectionAndSpinCount 86496->86506 86497->86496 86499 416b49 __calloc_crt 46 API calls 86497->86499 86501 4164f7 86497->86501 86503 41abb4 86497->86503 86498->86496 86499->86497 86500->86501 86501->86450 86560 411924 46 API calls 3 library calls 86501->86560 86502->86496 86503->86496 86504 41abe0 GetFileType 86503->86504 86505 41abeb InitializeCriticalSectionAndSpinCount 86503->86505 86504->86503 86504->86505 86505->86501 86505->86503 86506->86496 86506->86501 86508 41f595 86507->86508 86509 41f599 86507->86509 86508->86454 86585 416b04 86509->86585 86511 41f5bb _memmove 86512 41f5c2 FreeEnvironmentStringsW 86511->86512 86512->86454 86514 41f50b _wparse_cmdline 86513->86514 86515 416b04 __malloc_crt 46 API calls 86514->86515 86516 41f54e _wparse_cmdline 86514->86516 86515->86516 86516->86456 86518 41f2bc _wcslen 86517->86518 86522 41f2b4 86517->86522 86519 416b49 __calloc_crt 46 API calls 86518->86519 86524 41f2e0 _wcslen 86519->86524 86520 41f336 86592 413748 86520->86592 86522->86460 86523 416b49 __calloc_crt 46 API calls 86523->86524 86524->86520 86524->86522 86524->86523 86525 41f35c 86524->86525 86528 41f373 86524->86528 86591 41ef12 46 API calls __vswprintf_l 86524->86591 86526 413748 _free 46 API calls 86525->86526 86526->86522 86598 417ed3 86528->86598 86530 41f37f 86530->86460 86532 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86531->86532 86534 411750 __IsNonwritableInCurrentImage 86532->86534 86617 41130a 51 API calls __cinit 86532->86617 86534->86464 86536 42e2f3 86535->86536 86537 40d6cc 86535->86537 86618 408f40 86537->86618 86539 40d707 86622 40ebb0 86539->86622 86542 40d737 86625 411951 86542->86625 86547 40d751 86637 40f4e0 SystemParametersInfoW SystemParametersInfoW 86547->86637 86549 40d75f 86638 40d590 GetCurrentDirectoryW 86549->86638 86551 40d767 SystemParametersInfoW 86552 40d794 86551->86552 86553 40d78d FreeLibrary 86551->86553 86554 408f40 VariantClear 86552->86554 86553->86552 86555 40d79d 86554->86555 86556 408f40 VariantClear 86555->86556 86557 40d7a6 86556->86557 86557->86469 86564 4118da 46 API calls _doexit 86557->86564 86558->86442 86559->86446 86564->86469 86565->86472 86566->86481 86567->86488 86570 416b52 86568->86570 86571 416b8f 86570->86571 86572 416b70 Sleep 86570->86572 86576 41f677 86570->86576 86571->86486 86571->86491 86573 416b85 86572->86573 86573->86570 86573->86571 86574->86493 86575->86483 86577 41f683 86576->86577 86583 41f69e _malloc 86576->86583 86578 41f68f 86577->86578 86577->86583 86584 417f77 46 API calls __getptd_noexit 86578->86584 86580 41f6b1 HeapAlloc 86582 41f6d8 86580->86582 86580->86583 86581 41f694 86581->86570 86582->86570 86583->86580 86583->86582 86584->86581 86588 416b0d 86585->86588 86586 4135bb _malloc 45 API calls 86586->86588 86587 416b43 86587->86511 86588->86586 86588->86587 86589 416b24 Sleep 86588->86589 86590 416b39 86589->86590 86590->86587 86590->86588 86591->86524 86593 413753 RtlFreeHeap 86592->86593 86597 41377c __dosmaperr 86592->86597 86594 413768 86593->86594 86593->86597 86601 417f77 46 API calls __getptd_noexit 86594->86601 86596 41376e GetLastError 86596->86597 86597->86522 86602 417daa 86598->86602 86601->86596 86603 417dc9 __gmtime64_s __call_reportfault 86602->86603 86604 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86603->86604 86605 417eb5 __call_reportfault 86604->86605 86608 41a208 86605->86608 86607 417ed1 GetCurrentProcess TerminateProcess 86607->86530 86609 41a210 86608->86609 86610 41a212 IsDebuggerPresent 86608->86610 86609->86607 86616 41fe19 86610->86616 86613 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86614 421ff0 __call_reportfault 86613->86614 86615 421ff8 GetCurrentProcess TerminateProcess 86613->86615 86614->86615 86615->86607 86616->86613 86617->86534 86620 408f48 moneypunct 86618->86620 86619 4265c7 VariantClear 86621 408f55 moneypunct 86619->86621 86620->86619 86620->86621 86621->86539 86678 40ebd0 86622->86678 86682 4182cb 86625->86682 86627 41195e 86689 4181f2 LeaveCriticalSection 86627->86689 86629 40d748 86630 4119b0 86629->86630 86631 4119d6 86630->86631 86632 4119bc 86630->86632 86631->86547 86632->86631 86724 417f77 46 API calls __getptd_noexit 86632->86724 86634 4119c6 86725 417f25 10 API calls __vswprintf_l 86634->86725 86636 4119d1 86636->86547 86637->86549 86726 401f20 86638->86726 86640 40d5b6 IsDebuggerPresent 86641 40d5c4 86640->86641 86642 42e1bb MessageBoxA 86640->86642 86643 42e1d4 86641->86643 86644 40d5e3 86641->86644 86642->86643 86898 403a50 52 API calls 3 library calls 86643->86898 86796 40f520 86644->86796 86648 40d5fd GetFullPathNameW 86808 401460 86648->86808 86650 40d63b 86651 42e231 SetCurrentDirectoryW 86650->86651 86653 40d643 86650->86653 86651->86653 86652 40d64c 86823 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86652->86823 86653->86652 86899 432fee 6 API calls 86653->86899 86656 42e252 86656->86652 86659 42e25a GetModuleFileNameW 86656->86659 86661 42e274 86659->86661 86662 42e2cb GetForegroundWindow ShellExecuteW 86659->86662 86660 40d656 86663 40d669 86660->86663 86667 40e0c0 74 API calls 86660->86667 86900 401b10 86661->86900 86664 40d688 86662->86664 86831 4091e0 86663->86831 86671 40d692 SetCurrentDirectoryW 86664->86671 86667->86663 86671->86551 86672 42e28d 86907 40d200 52 API calls 2 library calls 86672->86907 86675 42e299 GetForegroundWindow ShellExecuteW 86676 42e2c6 86675->86676 86676->86664 86677 40ec00 LoadLibraryA GetProcAddress 86677->86542 86679 40d72e 86678->86679 86680 40ebd6 LoadLibraryA 86678->86680 86679->86542 86679->86677 86680->86679 86681 40ebe7 GetProcAddress 86680->86681 86681->86679 86683 4182e0 86682->86683 86684 4182f3 EnterCriticalSection 86682->86684 86690 418209 86683->86690 86684->86627 86686 4182e6 86686->86684 86717 411924 46 API calls 3 library calls 86686->86717 86689->86629 86691 418215 _raise 86690->86691 86692 418225 86691->86692 86693 41823d 86691->86693 86718 418901 46 API calls __NMSG_WRITE 86692->86718 86696 416b04 __malloc_crt 45 API calls 86693->86696 86702 41824b _raise 86693->86702 86695 41822a 86719 418752 46 API calls 8 library calls 86695->86719 86698 418256 86696->86698 86700 41825d 86698->86700 86701 41826c 86698->86701 86699 418231 86720 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86699->86720 86721 417f77 46 API calls __getptd_noexit 86700->86721 86705 4182cb __lock 45 API calls 86701->86705 86702->86686 86707 418273 86705->86707 86708 4182a6 86707->86708 86709 41827b InitializeCriticalSectionAndSpinCount 86707->86709 86712 413748 _free 45 API calls 86708->86712 86710 418297 86709->86710 86711 41828b 86709->86711 86723 4182c2 LeaveCriticalSection _doexit 86710->86723 86713 413748 _free 45 API calls 86711->86713 86712->86710 86714 418291 86713->86714 86722 417f77 46 API calls __getptd_noexit 86714->86722 86718->86695 86719->86699 86721->86702 86722->86710 86723->86702 86724->86634 86725->86636 86908 40e6e0 86726->86908 86730 401f41 GetModuleFileNameW 86926 410100 86730->86926 86732 401f5c 86938 410960 86732->86938 86735 401b10 52 API calls 86736 401f81 86735->86736 86941 401980 86736->86941 86738 401f8e 86739 408f40 VariantClear 86738->86739 86740 401f9d 86739->86740 86741 401b10 52 API calls 86740->86741 86742 401fb4 86741->86742 86743 401980 53 API calls 86742->86743 86744 401fc3 86743->86744 86745 401b10 52 API calls 86744->86745 86746 401fd2 86745->86746 86949 40c2c0 86746->86949 86748 401fe1 86749 40bc70 52 API calls 86748->86749 86750 401ff3 86749->86750 86967 401a10 86750->86967 86752 401ffe 86974 4114ab 86752->86974 86755 428b05 86757 401a10 52 API calls 86755->86757 86756 402017 86758 4114ab __wcsicoll 58 API calls 86756->86758 86759 428b18 86757->86759 86760 402022 86758->86760 86762 401a10 52 API calls 86759->86762 86760->86759 86761 40202d 86760->86761 86763 4114ab __wcsicoll 58 API calls 86761->86763 86764 428b33 86762->86764 86765 402038 86763->86765 86767 428b3b GetModuleFileNameW 86764->86767 86766 402043 86765->86766 86765->86767 86768 4114ab __wcsicoll 58 API calls 86766->86768 86769 401a10 52 API calls 86767->86769 86770 40204e 86768->86770 86771 428b6c 86769->86771 86772 402092 86770->86772 86777 401a10 52 API calls 86770->86777 86779 428b90 _wcscpy 86770->86779 86773 40e0a0 52 API calls 86771->86773 86775 4020a3 86772->86775 86772->86779 86774 428b7a 86773->86774 86778 401a10 52 API calls 86774->86778 86776 428bc6 86775->86776 86982 40e830 53 API calls 86775->86982 86781 402073 _wcscpy 86777->86781 86782 428b88 86778->86782 86783 401a10 52 API calls 86779->86783 86787 401a10 52 API calls 86781->86787 86782->86779 86791 4020d0 86783->86791 86784 4020bb 86983 40cf00 53 API calls 86784->86983 86786 4020c6 86788 408f40 VariantClear 86786->86788 86787->86772 86788->86791 86789 402110 86793 408f40 VariantClear 86789->86793 86791->86789 86794 401a10 52 API calls 86791->86794 86984 40cf00 53 API calls 86791->86984 86985 40e6a0 53 API calls 86791->86985 86795 402120 moneypunct 86793->86795 86794->86791 86795->86640 86797 4295c9 __gmtime64_s 86796->86797 86798 40f53c 86796->86798 86801 4295d9 GetOpenFileNameW 86797->86801 87664 410120 86798->87664 86800 40f545 87668 4102b0 SHGetMalloc 86800->87668 86801->86798 86803 40d5f5 86801->86803 86803->86648 86803->86650 86804 40f54c 87673 410190 GetFullPathNameW 86804->87673 86806 40f559 87684 40f570 86806->87684 87746 402400 86808->87746 86810 40146f 86813 428c29 _wcscat 86810->86813 87755 401500 86810->87755 86812 40147c 86812->86813 87763 40d440 86812->87763 86815 401489 86815->86813 86816 401491 GetFullPathNameW 86815->86816 86817 402160 52 API calls 86816->86817 86818 4014bb 86817->86818 86819 402160 52 API calls 86818->86819 86820 4014c8 86819->86820 86820->86813 86821 402160 52 API calls 86820->86821 86822 4014ee 86821->86822 86822->86650 86824 428361 86823->86824 86825 4103fc LoadImageW RegisterClassExW 86823->86825 87783 44395e EnumResourceNamesW LoadImageW 86824->87783 87782 410490 7 API calls 86825->87782 86828 40d651 86830 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86828->86830 86829 428368 86830->86660 86832 409202 86831->86832 86833 42d7ad 86831->86833 86889 409216 moneypunct 86832->86889 88055 410940 330 API calls 86832->88055 88058 45e737 90 API calls 3 library calls 86833->88058 86836 409386 86837 40939c 86836->86837 88056 40f190 10 API calls 86836->88056 86837->86664 86897 401000 Shell_NotifyIconW __gmtime64_s 86837->86897 86839 4095b2 86839->86837 86841 4095bf 86839->86841 86840 409253 PeekMessageW 86840->86889 88057 401a50 330 API calls 86841->88057 86843 42d8cd Sleep 86843->86889 86844 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86844->86837 86847 4095f9 86844->86847 86846 42e13b 88076 40d410 VariantClear 86846->88076 86850 42e158 TranslateMessage DispatchMessageW GetMessageW 86847->86850 86850->86850 86851 42e188 86850->86851 86851->86837 86853 409567 PeekMessageW 86853->86889 86855 44c29d 52 API calls 86895 4094e0 86855->86895 86856 46f3c1 107 API calls 86856->86889 86857 40e0a0 52 API calls 86857->86889 86858 46fdbf 108 API calls 86858->86895 86859 42dcd2 WaitForSingleObject 86865 42dcf0 GetExitCodeProcess CloseHandle 86859->86865 86859->86889 86860 409551 TranslateMessage DispatchMessageW 86860->86853 86863 42dd3d Sleep 86863->86895 86864 47d33e 308 API calls 86864->86889 88065 40d410 VariantClear 86865->88065 86868 4094cf Sleep 86868->86895 86870 42d94d timeGetTime 88061 465124 53 API calls 86870->88061 86872 40d410 VariantClear 86872->86889 86873 40c620 timeGetTime 86873->86895 86875 465124 53 API calls 86875->86895 86877 42dd89 CloseHandle 86877->86895 86879 42de19 GetExitCodeProcess CloseHandle 86879->86895 86880 401b10 52 API calls 86880->86895 86883 42de88 Sleep 86883->86889 86886 45e737 90 API calls 86886->86889 86889->86836 86889->86840 86889->86843 86889->86846 86889->86853 86889->86856 86889->86857 86889->86859 86889->86860 86889->86863 86889->86864 86889->86868 86889->86870 86889->86872 86889->86886 86890 42e0cc VariantClear 86889->86890 86891 408f40 VariantClear 86889->86891 86889->86895 87784 4091b0 86889->87784 87842 40afa0 86889->87842 87868 408fc0 86889->87868 87903 408cc0 86889->87903 87917 40d150 86889->87917 87922 40d170 86889->87922 87928 4096a0 86889->87928 88059 465124 53 API calls 86889->88059 88060 40c620 timeGetTime 86889->88060 88075 40e270 VariantClear moneypunct 86889->88075 86890->86889 86891->86889 86893 401980 53 API calls 86893->86895 86895->86855 86895->86858 86895->86873 86895->86875 86895->86877 86895->86879 86895->86880 86895->86883 86895->86889 86895->86893 86896 408f40 VariantClear 86895->86896 88062 45178a 54 API calls 86895->88062 88063 47d33e 330 API calls 86895->88063 88064 453bc6 54 API calls 86895->88064 88066 40d410 VariantClear 86895->88066 88067 443d19 67 API calls _wcslen 86895->88067 88068 4574b4 VariantClear 86895->88068 88069 403cd0 86895->88069 88073 4731e1 VariantClear 86895->88073 88074 4331a2 6 API calls 86895->88074 86896->86895 86897->86664 86898->86650 86899->86656 86901 401b16 _wcslen 86900->86901 86902 4115d7 52 API calls 86901->86902 86903 401b63 86901->86903 86904 401b4b _memmove 86902->86904 86906 40d200 52 API calls 2 library calls 86903->86906 86905 4115d7 52 API calls 86904->86905 86905->86903 86906->86672 86907->86675 86909 40bc70 52 API calls 86908->86909 86910 401f31 86909->86910 86911 402560 86910->86911 86912 40256d __write_nolock 86911->86912 86913 402160 52 API calls 86912->86913 86915 402593 86913->86915 86925 4025bd 86915->86925 86986 401c90 86915->86986 86916 4026f0 52 API calls 86916->86925 86917 4026a7 86918 401b10 52 API calls 86917->86918 86924 4026db 86917->86924 86920 4026d1 86918->86920 86919 401b10 52 API calls 86919->86925 86990 40d7c0 52 API calls 2 library calls 86920->86990 86922 401c90 52 API calls 86922->86925 86924->86730 86925->86916 86925->86917 86925->86919 86925->86922 86989 40d7c0 52 API calls 2 library calls 86925->86989 86991 40f760 86926->86991 86929 410118 86929->86732 86931 42805d 86934 42806a 86931->86934 87047 431e58 86931->87047 86933 413748 _free 46 API calls 86935 428078 86933->86935 86934->86933 86936 431e58 82 API calls 86935->86936 86937 428084 86936->86937 86937->86732 86939 4115d7 52 API calls 86938->86939 86940 401f74 86939->86940 86940->86735 86942 4019a3 86941->86942 86947 401985 86941->86947 86943 4019b8 86942->86943 86942->86947 87653 403e10 53 API calls 86943->87653 86945 40199f 86945->86738 86946 4019c4 86946->86738 86947->86945 87652 403e10 53 API calls 86947->87652 86950 40c2c7 86949->86950 86951 40c30e 86949->86951 86952 40c2d3 86950->86952 86953 426c79 86950->86953 86954 40c315 86951->86954 86955 426c2b 86951->86955 87654 403ea0 52 API calls __cinit 86952->87654 87659 4534e3 52 API calls 86953->87659 86959 40c321 86954->86959 86960 426c5a 86954->86960 86957 426c4b 86955->86957 86958 426c2e 86955->86958 87657 4534e3 52 API calls 86957->87657 86966 40c2de 86958->86966 87656 4534e3 52 API calls 86958->87656 87655 403ea0 52 API calls __cinit 86959->87655 87658 4534e3 52 API calls 86960->87658 86966->86748 86968 401a30 86967->86968 86969 401a17 86967->86969 86971 402160 52 API calls 86968->86971 86970 401a2d 86969->86970 87660 403c30 52 API calls _memmove 86969->87660 86970->86752 86973 401a3d 86971->86973 86973->86752 86975 411523 86974->86975 86976 4114ba 86974->86976 87663 4113a8 58 API calls 3 library calls 86975->87663 86979 40200c 86976->86979 87661 417f77 46 API calls __getptd_noexit 86976->87661 86979->86755 86979->86756 86980 4114c6 87662 417f25 10 API calls __vswprintf_l 86980->87662 86982->86784 86983->86786 86984->86791 86985->86791 86987 4026f0 52 API calls 86986->86987 86988 401c97 86987->86988 86988->86915 86989->86925 86990->86924 87051 40f6f0 86991->87051 86993 40f77b _strcat moneypunct 87059 40f850 86993->87059 86998 427c2a 87088 414d04 86998->87088 87000 40f7fc 87000->86998 87002 40f804 87000->87002 87075 414a46 87002->87075 87006 40f80e 87006->86929 87010 4528bd 87006->87010 87007 427c59 87094 414fe2 87007->87094 87009 427c79 87011 4150d1 _fseek 81 API calls 87010->87011 87012 452930 87011->87012 87594 452719 87012->87594 87015 452948 87015->86931 87016 414d04 __fread_nolock 61 API calls 87017 452966 87016->87017 87018 414d04 __fread_nolock 61 API calls 87017->87018 87019 452976 87018->87019 87020 414d04 __fread_nolock 61 API calls 87019->87020 87021 45298f 87020->87021 87022 414d04 __fread_nolock 61 API calls 87021->87022 87023 4529aa 87022->87023 87024 4150d1 _fseek 81 API calls 87023->87024 87025 4529c4 87024->87025 87026 4135bb _malloc 46 API calls 87025->87026 87027 4529cf 87026->87027 87028 4135bb _malloc 46 API calls 87027->87028 87029 4529db 87028->87029 87030 414d04 __fread_nolock 61 API calls 87029->87030 87031 4529ec 87030->87031 87032 44afef GetSystemTimeAsFileTime 87031->87032 87033 452a00 87032->87033 87034 452a36 87033->87034 87035 452a13 87033->87035 87037 452aa5 87034->87037 87038 452a3c 87034->87038 87036 413748 _free 46 API calls 87035->87036 87039 452a1c 87036->87039 87041 413748 _free 46 API calls 87037->87041 87600 44b1a9 87038->87600 87042 413748 _free 46 API calls 87039->87042 87044 452aa3 87041->87044 87045 452a25 87042->87045 87043 452a9d 87046 413748 _free 46 API calls 87043->87046 87044->86931 87045->86931 87046->87044 87048 431e64 87047->87048 87049 431e6a 87047->87049 87050 414a46 __fcloseall 82 API calls 87048->87050 87049->86934 87050->87049 87052 425de2 87051->87052 87053 40f6fc _wcslen 87051->87053 87052->86993 87054 40f710 WideCharToMultiByte 87053->87054 87055 40f756 87054->87055 87056 40f728 87054->87056 87055->86993 87057 4115d7 52 API calls 87056->87057 87058 40f735 WideCharToMultiByte 87057->87058 87058->86993 87061 40f85d __gmtime64_s _strlen 87059->87061 87062 40f7ab 87061->87062 87107 414db8 87061->87107 87063 4149c2 87062->87063 87122 414904 87063->87122 87065 40f7e9 87065->86998 87066 40f5c0 87065->87066 87071 40f5cd _strcat __write_nolock _memmove 87066->87071 87067 414d04 __fread_nolock 61 API calls 87067->87071 87069 425d11 87070 4150d1 _fseek 81 API calls 87069->87070 87072 425d33 87070->87072 87071->87067 87071->87069 87074 40f691 __tzset_nolock 87071->87074 87210 4150d1 87071->87210 87073 414d04 __fread_nolock 61 API calls 87072->87073 87073->87074 87074->87000 87076 414a52 _raise 87075->87076 87077 414a64 87076->87077 87078 414a79 87076->87078 87350 417f77 46 API calls __getptd_noexit 87077->87350 87080 415471 __lock_file 47 API calls 87078->87080 87086 414a74 _raise 87078->87086 87082 414a92 87080->87082 87081 414a69 87351 417f25 10 API calls __vswprintf_l 87081->87351 87334 4149d9 87082->87334 87086->87006 87419 414c76 87088->87419 87090 414d1c 87091 44afef 87090->87091 87587 442c5a 87091->87587 87093 44b00d 87093->87007 87095 414fee _raise 87094->87095 87096 414ffa 87095->87096 87097 41500f 87095->87097 87591 417f77 46 API calls __getptd_noexit 87096->87591 87099 415471 __lock_file 47 API calls 87097->87099 87101 415017 87099->87101 87100 414fff 87592 417f25 10 API calls __vswprintf_l 87100->87592 87103 414e4e __ftell_nolock 51 API calls 87101->87103 87104 415024 87103->87104 87593 41503d LeaveCriticalSection LeaveCriticalSection __wfsopen 87104->87593 87106 41500a _raise 87106->87009 87108 414dd6 87107->87108 87109 414deb 87107->87109 87118 417f77 46 API calls __getptd_noexit 87108->87118 87109->87108 87111 414df2 87109->87111 87120 41b91b 79 API calls 11 library calls 87111->87120 87112 414ddb 87119 417f25 10 API calls __vswprintf_l 87112->87119 87115 414e18 87116 414de6 87115->87116 87121 418f98 77 API calls 6 library calls 87115->87121 87116->87061 87118->87112 87119->87116 87120->87115 87121->87116 87123 414910 _raise 87122->87123 87124 414923 87123->87124 87127 414951 87123->87127 87178 417f77 46 API calls __getptd_noexit 87124->87178 87126 414928 87179 417f25 10 API calls __vswprintf_l 87126->87179 87141 41d4d1 87127->87141 87130 414956 87131 41496a 87130->87131 87132 41495d 87130->87132 87133 414992 87131->87133 87134 414972 87131->87134 87180 417f77 46 API calls __getptd_noexit 87132->87180 87158 41d218 87133->87158 87181 417f77 46 API calls __getptd_noexit 87134->87181 87138 414933 _raise @_EH4_CallFilterFunc@8 87138->87065 87142 41d4dd _raise 87141->87142 87143 4182cb __lock 46 API calls 87142->87143 87144 41d4eb 87143->87144 87145 41d567 87144->87145 87153 418209 __mtinitlocknum 46 API calls 87144->87153 87156 41d560 87144->87156 87186 4154b2 47 API calls __lock 87144->87186 87187 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87144->87187 87146 416b04 __malloc_crt 46 API calls 87145->87146 87148 41d56e 87146->87148 87149 41d57c InitializeCriticalSectionAndSpinCount 87148->87149 87148->87156 87151 41d59c 87149->87151 87152 41d5af EnterCriticalSection 87149->87152 87150 41d5f0 _raise 87150->87130 87155 413748 _free 46 API calls 87151->87155 87152->87156 87153->87144 87155->87156 87183 41d5fb 87156->87183 87159 41d23a 87158->87159 87160 41d255 87159->87160 87171 41d26c __wopenfile 87159->87171 87192 417f77 46 API calls __getptd_noexit 87160->87192 87162 41d25a 87193 417f25 10 API calls __vswprintf_l 87162->87193 87164 41d47a 87197 417f77 46 API calls __getptd_noexit 87164->87197 87165 41d48c 87189 422bf9 87165->87189 87168 41d47f 87198 417f25 10 API calls __vswprintf_l 87168->87198 87169 41499d 87182 4149b8 LeaveCriticalSection LeaveCriticalSection __wfsopen 87169->87182 87171->87164 87177 41d421 87171->87177 87194 41341f 58 API calls 2 library calls 87171->87194 87173 41d41a 87173->87177 87195 41341f 58 API calls 2 library calls 87173->87195 87175 41d439 87175->87177 87196 41341f 58 API calls 2 library calls 87175->87196 87177->87164 87177->87165 87178->87126 87179->87138 87180->87138 87181->87138 87182->87138 87188 4181f2 LeaveCriticalSection 87183->87188 87185 41d602 87185->87150 87186->87144 87187->87144 87188->87185 87199 422b35 87189->87199 87191 422c14 87191->87169 87192->87162 87193->87169 87194->87173 87195->87175 87196->87177 87197->87168 87198->87169 87201 422b41 _raise 87199->87201 87200 422b54 87202 417f77 __vswprintf_l 46 API calls 87200->87202 87201->87200 87203 422b8a 87201->87203 87204 422b59 87202->87204 87205 422400 __tsopen_nolock 109 API calls 87203->87205 87206 417f25 __vswprintf_l 10 API calls 87204->87206 87207 422ba4 87205->87207 87209 422b63 _raise 87206->87209 87208 422bcb __wsopen_helper LeaveCriticalSection 87207->87208 87208->87209 87209->87191 87212 4150dd _raise 87210->87212 87211 4150e9 87241 417f77 46 API calls __getptd_noexit 87211->87241 87212->87211 87213 41510f 87212->87213 87223 415471 87213->87223 87215 4150ee 87242 417f25 10 API calls __vswprintf_l 87215->87242 87220 4150f9 _raise 87220->87071 87224 415483 87223->87224 87225 4154a5 EnterCriticalSection 87223->87225 87224->87225 87226 41548b 87224->87226 87227 415117 87225->87227 87228 4182cb __lock 46 API calls 87226->87228 87229 415047 87227->87229 87228->87227 87230 415067 87229->87230 87231 415057 87229->87231 87236 415079 87230->87236 87244 414e4e 87230->87244 87299 417f77 46 API calls __getptd_noexit 87231->87299 87235 41505c 87243 415143 LeaveCriticalSection LeaveCriticalSection __wfsopen 87235->87243 87261 41443c 87236->87261 87239 4150b9 87274 41e1f4 87239->87274 87241->87215 87242->87220 87243->87220 87245 414e61 87244->87245 87246 414e79 87244->87246 87300 417f77 46 API calls __getptd_noexit 87245->87300 87247 414139 __fseek_nolock 46 API calls 87246->87247 87249 414e80 87247->87249 87252 41e1f4 __write 51 API calls 87249->87252 87250 414e66 87301 417f25 10 API calls __vswprintf_l 87250->87301 87253 414e97 87252->87253 87254 414f09 87253->87254 87256 414ec9 87253->87256 87260 414e71 87253->87260 87302 417f77 46 API calls __getptd_noexit 87254->87302 87257 41e1f4 __write 51 API calls 87256->87257 87256->87260 87258 414f64 87257->87258 87259 41e1f4 __write 51 API calls 87258->87259 87258->87260 87259->87260 87260->87236 87262 414455 87261->87262 87266 414477 87261->87266 87263 414139 __fseek_nolock 46 API calls 87262->87263 87262->87266 87264 414470 87263->87264 87303 41b7b2 77 API calls 6 library calls 87264->87303 87267 414139 87266->87267 87268 414145 87267->87268 87269 41415a 87267->87269 87304 417f77 46 API calls __getptd_noexit 87268->87304 87269->87239 87271 41414a 87305 417f25 10 API calls __vswprintf_l 87271->87305 87273 414155 87273->87239 87275 41e200 _raise 87274->87275 87276 41e223 87275->87276 87277 41e208 87275->87277 87279 41e22f 87276->87279 87283 41e269 87276->87283 87326 417f8a 46 API calls __getptd_noexit 87277->87326 87328 417f8a 46 API calls __getptd_noexit 87279->87328 87281 41e20d 87327 417f77 46 API calls __getptd_noexit 87281->87327 87282 41e234 87329 417f77 46 API calls __getptd_noexit 87282->87329 87306 41ae56 87283->87306 87287 41e23c 87330 417f25 10 API calls __vswprintf_l 87287->87330 87288 41e26f 87290 41e291 87288->87290 87291 41e27d 87288->87291 87331 417f77 46 API calls __getptd_noexit 87290->87331 87316 41e17f 87291->87316 87292 41e215 _raise 87292->87235 87295 41e289 87333 41e2c0 LeaveCriticalSection __unlock_fhandle 87295->87333 87296 41e296 87332 417f8a 46 API calls __getptd_noexit 87296->87332 87299->87235 87300->87250 87301->87260 87302->87260 87303->87266 87304->87271 87305->87273 87307 41ae62 _raise 87306->87307 87308 41aebc 87307->87308 87309 4182cb __lock 46 API calls 87307->87309 87310 41aec1 EnterCriticalSection 87308->87310 87311 41aede _raise 87308->87311 87312 41ae8e 87309->87312 87310->87311 87311->87288 87313 41aeaa 87312->87313 87314 41ae97 InitializeCriticalSectionAndSpinCount 87312->87314 87315 41aeec ___lock_fhandle LeaveCriticalSection 87313->87315 87314->87313 87315->87308 87317 41aded __commit 46 API calls 87316->87317 87318 41e18e 87317->87318 87319 41e1a4 SetFilePointer 87318->87319 87320 41e194 87318->87320 87322 41e1c3 87319->87322 87323 41e1bb GetLastError 87319->87323 87321 417f77 __vswprintf_l 46 API calls 87320->87321 87324 41e199 87321->87324 87322->87324 87325 417f9d __dosmaperr 46 API calls 87322->87325 87323->87322 87324->87295 87325->87324 87326->87281 87327->87292 87328->87282 87329->87287 87330->87292 87331->87296 87332->87295 87333->87292 87335 4149ea 87334->87335 87336 4149fe 87334->87336 87380 417f77 46 API calls __getptd_noexit 87335->87380 87337 4149fa 87336->87337 87339 41443c __flush 77 API calls 87336->87339 87352 414ab2 LeaveCriticalSection LeaveCriticalSection __wfsopen 87337->87352 87341 414a0a 87339->87341 87340 4149ef 87381 417f25 10 API calls __vswprintf_l 87340->87381 87353 41d8c2 87341->87353 87345 414139 __fseek_nolock 46 API calls 87346 414a18 87345->87346 87357 41d7fe 87346->87357 87348 414a1e 87348->87337 87349 413748 _free 46 API calls 87348->87349 87349->87337 87350->87081 87351->87086 87352->87086 87354 414a12 87353->87354 87355 41d8d2 87353->87355 87354->87345 87355->87354 87356 413748 _free 46 API calls 87355->87356 87356->87354 87358 41d80a _raise 87357->87358 87359 41d812 87358->87359 87362 41d82d 87358->87362 87397 417f8a 46 API calls __getptd_noexit 87359->87397 87360 41d839 87399 417f8a 46 API calls __getptd_noexit 87360->87399 87362->87360 87366 41d873 87362->87366 87364 41d817 87398 417f77 46 API calls __getptd_noexit 87364->87398 87365 41d83e 87400 417f77 46 API calls __getptd_noexit 87365->87400 87369 41ae56 ___lock_fhandle 48 API calls 87366->87369 87371 41d879 87369->87371 87370 41d846 87401 417f25 10 API calls __vswprintf_l 87370->87401 87373 41d893 87371->87373 87374 41d887 87371->87374 87402 417f77 46 API calls __getptd_noexit 87373->87402 87382 41d762 87374->87382 87376 41d81f _raise 87376->87348 87378 41d88d 87403 41d8ba LeaveCriticalSection __unlock_fhandle 87378->87403 87380->87340 87381->87337 87404 41aded 87382->87404 87384 41d7c8 87417 41ad67 47 API calls 2 library calls 87384->87417 87385 41d772 87385->87384 87386 41d7a6 87385->87386 87388 41aded __commit 46 API calls 87385->87388 87386->87384 87389 41aded __commit 46 API calls 87386->87389 87392 41d79d 87388->87392 87393 41d7b2 CloseHandle 87389->87393 87390 41d7d0 87391 41d7f2 87390->87391 87418 417f9d 46 API calls 2 library calls 87390->87418 87391->87378 87395 41aded __commit 46 API calls 87392->87395 87393->87384 87396 41d7be GetLastError 87393->87396 87395->87386 87396->87384 87397->87364 87398->87376 87399->87365 87400->87370 87401->87376 87402->87378 87403->87376 87405 41ae12 87404->87405 87406 41adfa 87404->87406 87408 417f8a __dosmaperr 46 API calls 87405->87408 87411 41ae51 87405->87411 87407 417f8a __dosmaperr 46 API calls 87406->87407 87409 41adff 87407->87409 87410 41ae23 87408->87410 87412 417f77 __vswprintf_l 46 API calls 87409->87412 87413 417f77 __vswprintf_l 46 API calls 87410->87413 87411->87385 87414 41ae07 87412->87414 87415 41ae2b 87413->87415 87414->87385 87416 417f25 __vswprintf_l 10 API calls 87415->87416 87416->87414 87417->87390 87418->87391 87420 414c82 _raise 87419->87420 87421 414cc3 87420->87421 87422 414c96 __gmtime64_s 87420->87422 87424 414cbb _raise 87420->87424 87423 415471 __lock_file 47 API calls 87421->87423 87446 417f77 46 API calls __getptd_noexit 87422->87446 87425 414ccb 87423->87425 87424->87090 87432 414aba 87425->87432 87428 414cb0 87447 417f25 10 API calls __vswprintf_l 87428->87447 87436 414ad8 __gmtime64_s 87432->87436 87439 414af2 87432->87439 87433 414ae2 87499 417f77 46 API calls __getptd_noexit 87433->87499 87435 414ae7 87500 417f25 10 API calls __vswprintf_l 87435->87500 87436->87433 87436->87439 87444 414b2d 87436->87444 87448 414cfa LeaveCriticalSection LeaveCriticalSection __wfsopen 87439->87448 87440 414c38 __gmtime64_s 87502 417f77 46 API calls __getptd_noexit 87440->87502 87442 414139 __fseek_nolock 46 API calls 87442->87444 87444->87439 87444->87440 87444->87442 87449 41dfcc 87444->87449 87479 41d8f3 87444->87479 87501 41e0c2 46 API calls 3 library calls 87444->87501 87446->87428 87447->87424 87448->87424 87450 41dfd8 _raise 87449->87450 87451 41dfe0 87450->87451 87452 41dffb 87450->87452 87572 417f8a 46 API calls __getptd_noexit 87451->87572 87454 41e007 87452->87454 87458 41e041 87452->87458 87574 417f8a 46 API calls __getptd_noexit 87454->87574 87456 41dfe5 87573 417f77 46 API calls __getptd_noexit 87456->87573 87457 41e00c 87575 417f77 46 API calls __getptd_noexit 87457->87575 87461 41e063 87458->87461 87462 41e04e 87458->87462 87466 41ae56 ___lock_fhandle 48 API calls 87461->87466 87577 417f8a 46 API calls __getptd_noexit 87462->87577 87463 41dfed _raise 87463->87444 87464 41e014 87576 417f25 10 API calls __vswprintf_l 87464->87576 87467 41e069 87466->87467 87469 41e077 87467->87469 87470 41e08b 87467->87470 87468 41e053 87578 417f77 46 API calls __getptd_noexit 87468->87578 87503 41da15 87469->87503 87579 417f77 46 API calls __getptd_noexit 87470->87579 87475 41e083 87581 41e0ba LeaveCriticalSection __unlock_fhandle 87475->87581 87476 41e090 87580 417f8a 46 API calls __getptd_noexit 87476->87580 87480 41d900 87479->87480 87484 41d915 87479->87484 87585 417f77 46 API calls __getptd_noexit 87480->87585 87482 41d905 87586 417f25 10 API calls __vswprintf_l 87482->87586 87485 41d94a 87484->87485 87491 41d910 87484->87491 87582 420603 87484->87582 87487 414139 __fseek_nolock 46 API calls 87485->87487 87488 41d95e 87487->87488 87489 41dfcc __read 59 API calls 87488->87489 87490 41d965 87489->87490 87490->87491 87492 414139 __fseek_nolock 46 API calls 87490->87492 87491->87444 87493 41d988 87492->87493 87493->87491 87494 414139 __fseek_nolock 46 API calls 87493->87494 87495 41d994 87494->87495 87495->87491 87496 414139 __fseek_nolock 46 API calls 87495->87496 87497 41d9a1 87496->87497 87498 414139 __fseek_nolock 46 API calls 87497->87498 87498->87491 87499->87435 87500->87439 87501->87444 87502->87435 87504 41da31 87503->87504 87505 41da4c 87503->87505 87506 417f8a __dosmaperr 46 API calls 87504->87506 87507 41da5b 87505->87507 87509 41da7a 87505->87509 87508 41da36 87506->87508 87510 417f8a __dosmaperr 46 API calls 87507->87510 87512 417f77 __vswprintf_l 46 API calls 87508->87512 87511 41da98 87509->87511 87527 41daac 87509->87527 87513 41da60 87510->87513 87514 417f8a __dosmaperr 46 API calls 87511->87514 87515 41da3e 87512->87515 87517 417f77 __vswprintf_l 46 API calls 87513->87517 87519 41da9d 87514->87519 87515->87475 87516 41db02 87518 417f8a __dosmaperr 46 API calls 87516->87518 87520 41da67 87517->87520 87521 41db07 87518->87521 87522 417f77 __vswprintf_l 46 API calls 87519->87522 87523 417f25 __vswprintf_l 10 API calls 87520->87523 87524 417f77 __vswprintf_l 46 API calls 87521->87524 87525 41daa4 87522->87525 87523->87515 87524->87525 87529 417f25 __vswprintf_l 10 API calls 87525->87529 87526 41dae1 87526->87516 87534 41daec ReadFile 87526->87534 87527->87515 87527->87516 87527->87526 87528 41db1b 87527->87528 87531 416b04 __malloc_crt 46 API calls 87528->87531 87529->87515 87535 41db31 87531->87535 87532 41dc17 87533 41df8f GetLastError 87532->87533 87540 41dc2b 87532->87540 87536 41de16 87533->87536 87537 41df9c 87533->87537 87534->87532 87534->87533 87538 41db59 87535->87538 87539 41db3b 87535->87539 87546 417f9d __dosmaperr 46 API calls 87536->87546 87551 41dd9b 87536->87551 87542 417f77 __vswprintf_l 46 API calls 87537->87542 87541 420494 __lseeki64_nolock 48 API calls 87538->87541 87543 417f77 __vswprintf_l 46 API calls 87539->87543 87540->87551 87553 41de5b 87540->87553 87554 41dc47 87540->87554 87544 41db67 87541->87544 87545 41dfa1 87542->87545 87547 41db40 87543->87547 87544->87534 87549 417f8a __dosmaperr 46 API calls 87545->87549 87546->87551 87548 417f8a __dosmaperr 46 API calls 87547->87548 87548->87515 87549->87551 87550 413748 _free 46 API calls 87550->87515 87551->87515 87551->87550 87552 41ded0 ReadFile 87557 41deef GetLastError 87552->87557 87564 41def9 87552->87564 87553->87551 87553->87552 87555 41dcab ReadFile 87554->87555 87560 41dd28 87554->87560 87556 41dcc9 GetLastError 87555->87556 87563 41dcd3 87555->87563 87556->87554 87556->87563 87557->87553 87557->87564 87558 41ddec MultiByteToWideChar 87558->87551 87559 41de10 GetLastError 87558->87559 87559->87536 87560->87551 87561 41dda3 87560->87561 87562 41dd96 87560->87562 87566 41dd60 87560->87566 87561->87566 87567 41ddda 87561->87567 87565 417f77 __vswprintf_l 46 API calls 87562->87565 87563->87554 87568 420494 __lseeki64_nolock 48 API calls 87563->87568 87564->87553 87569 420494 __lseeki64_nolock 48 API calls 87564->87569 87565->87551 87566->87558 87570 420494 __lseeki64_nolock 48 API calls 87567->87570 87568->87563 87569->87564 87571 41dde9 87570->87571 87571->87558 87572->87456 87573->87463 87574->87457 87575->87464 87576->87463 87577->87468 87578->87464 87579->87476 87580->87475 87581->87463 87583 416b04 __malloc_crt 46 API calls 87582->87583 87584 420618 87583->87584 87584->87485 87585->87482 87586->87491 87590 4148b3 GetSystemTimeAsFileTime __aulldiv 87587->87590 87589 442c6b 87589->87093 87590->87589 87591->87100 87592->87106 87593->87106 87598 45272f __tzset_nolock _wcscpy 87594->87598 87595 414d04 61 API calls __fread_nolock 87595->87598 87596 44afef GetSystemTimeAsFileTime 87596->87598 87597 4528a4 87597->87015 87597->87016 87598->87595 87598->87596 87598->87597 87599 4150d1 81 API calls _fseek 87598->87599 87599->87598 87601 44b1bc 87600->87601 87602 44b1ca 87600->87602 87603 4149c2 116 API calls 87601->87603 87604 44b1e1 87602->87604 87605 4149c2 116 API calls 87602->87605 87606 44b1d8 87602->87606 87603->87602 87635 4321a4 87604->87635 87608 44b2db 87605->87608 87606->87043 87608->87604 87610 44b2e9 87608->87610 87609 44b224 87611 44b253 87609->87611 87612 44b228 87609->87612 87613 44b2f6 87610->87613 87615 414a46 __fcloseall 82 API calls 87610->87615 87639 43213d 87611->87639 87614 44b235 87612->87614 87617 414a46 __fcloseall 82 API calls 87612->87617 87613->87043 87619 414a46 __fcloseall 82 API calls 87614->87619 87623 44b245 87614->87623 87615->87613 87617->87614 87618 44b25a 87620 44b260 87618->87620 87621 44b289 87618->87621 87619->87623 87624 44b26d 87620->87624 87625 414a46 __fcloseall 82 API calls 87620->87625 87649 44b0bf 87 API calls 87621->87649 87623->87043 87626 44b27d 87624->87626 87628 414a46 __fcloseall 82 API calls 87624->87628 87625->87624 87626->87043 87627 44b28f 87650 4320f8 46 API calls _free 87627->87650 87628->87626 87630 44b295 87631 44b2a2 87630->87631 87633 414a46 __fcloseall 82 API calls 87630->87633 87632 44b2b2 87631->87632 87634 414a46 __fcloseall 82 API calls 87631->87634 87632->87043 87633->87631 87634->87632 87636 4321b4 __tzset_nolock _memmove 87635->87636 87637 4321cb 87635->87637 87636->87609 87638 414d04 __fread_nolock 61 API calls 87637->87638 87638->87636 87640 4135bb _malloc 46 API calls 87639->87640 87641 432150 87640->87641 87642 4135bb _malloc 46 API calls 87641->87642 87643 432162 87642->87643 87644 4135bb _malloc 46 API calls 87643->87644 87645 432174 87644->87645 87647 432189 87645->87647 87651 4320f8 46 API calls _free 87645->87651 87647->87618 87648 432198 87648->87618 87649->87627 87650->87630 87651->87648 87652->86945 87653->86946 87654->86966 87655->86966 87656->86966 87657->86960 87658->86966 87659->86966 87660->86970 87661->86980 87662->86979 87663->86979 87713 410160 87664->87713 87666 41012f GetFullPathNameW 87667 410147 moneypunct 87666->87667 87667->86800 87669 4102cb SHGetDesktopFolder 87668->87669 87672 410333 _wcsncpy 87668->87672 87670 4102e0 _wcsncpy 87669->87670 87669->87672 87671 41031c SHGetPathFromIDListW 87670->87671 87670->87672 87671->87672 87672->86804 87674 4101bb 87673->87674 87681 425f4a 87673->87681 87675 410160 52 API calls 87674->87675 87677 4101c7 87675->87677 87676 4114ab __wcsicoll 58 API calls 87676->87681 87717 410200 52 API calls 2 library calls 87677->87717 87679 4101d6 87718 410200 52 API calls 2 library calls 87679->87718 87680 425f6e 87680->86806 87681->87676 87681->87680 87683 4101e9 87683->86806 87685 40f760 128 API calls 87684->87685 87686 40f584 87685->87686 87687 429335 87686->87687 87688 40f58c 87686->87688 87691 4528bd 118 API calls 87687->87691 87689 40f598 87688->87689 87690 429358 87688->87690 87743 4033c0 113 API calls 7 library calls 87689->87743 87744 434034 86 API calls _wprintf 87690->87744 87693 42934b 87691->87693 87696 429373 87693->87696 87697 42934f 87693->87697 87695 40f5b4 87695->86803 87700 4115d7 52 API calls 87696->87700 87699 431e58 82 API calls 87697->87699 87698 429369 87698->87696 87699->87690 87705 4293c5 moneypunct 87700->87705 87701 42959c 87702 413748 _free 46 API calls 87701->87702 87703 4295a5 87702->87703 87704 431e58 82 API calls 87703->87704 87706 4295b1 87704->87706 87705->87701 87710 401b10 52 API calls 87705->87710 87719 444af8 87705->87719 87722 44b41c 87705->87722 87729 402780 87705->87729 87737 4022d0 87705->87737 87745 44c7dd 64 API calls 3 library calls 87705->87745 87710->87705 87714 410167 _wcslen 87713->87714 87715 4115d7 52 API calls 87714->87715 87716 41017e _wcscpy 87715->87716 87716->87666 87717->87679 87718->87683 87720 4115d7 52 API calls 87719->87720 87721 444b27 _memmove 87720->87721 87721->87705 87723 44b429 87722->87723 87724 4115d7 52 API calls 87723->87724 87725 44b440 87724->87725 87726 44b45e 87725->87726 87727 401b10 52 API calls 87725->87727 87726->87705 87728 44b453 87727->87728 87728->87705 87731 402827 87729->87731 87736 402790 moneypunct _memmove 87729->87736 87730 4115d7 52 API calls 87733 402797 87730->87733 87732 4115d7 52 API calls 87731->87732 87732->87736 87734 4115d7 52 API calls 87733->87734 87735 4027bd 87733->87735 87734->87735 87735->87705 87736->87730 87738 4022e0 87737->87738 87739 40239d 87737->87739 87738->87739 87740 4115d7 52 API calls 87738->87740 87741 402320 moneypunct 87738->87741 87739->87705 87740->87741 87741->87739 87742 4115d7 52 API calls 87741->87742 87742->87741 87743->87695 87744->87698 87745->87705 87747 402417 87746->87747 87751 402539 moneypunct 87746->87751 87748 4115d7 52 API calls 87747->87748 87747->87751 87749 402443 87748->87749 87750 4115d7 52 API calls 87749->87750 87752 4024b4 87750->87752 87751->86810 87752->87751 87752->87752 87754 4022d0 52 API calls 87752->87754 87775 402880 95 API calls 2 library calls 87752->87775 87754->87752 87760 401566 87755->87760 87756 401794 87776 40e9a0 90 API calls 87756->87776 87759 40167a 87762 4017c0 87759->87762 87777 45e737 90 API calls 3 library calls 87759->87777 87760->87756 87760->87759 87761 4010a0 52 API calls 87760->87761 87761->87760 87762->86812 87764 40bc70 52 API calls 87763->87764 87773 40d451 87764->87773 87765 40d50f 87780 410600 52 API calls 87765->87780 87767 427c01 87781 45e737 90 API calls 3 library calls 87767->87781 87768 40e0a0 52 API calls 87768->87773 87770 401b10 52 API calls 87770->87773 87771 40d519 87771->86815 87773->87765 87773->87767 87773->87768 87773->87770 87773->87771 87778 40f310 53 API calls 87773->87778 87779 40d860 91 API calls 87773->87779 87775->87752 87776->87759 87777->87762 87778->87773 87779->87773 87780->87771 87781->87771 87782->86828 87783->86829 87785 42c5fe 87784->87785 87799 4091c6 87784->87799 87786 40bc70 52 API calls 87785->87786 87785->87799 87787 42c64e InterlockedIncrement 87786->87787 87788 42c665 87787->87788 87793 42c697 87787->87793 87790 42c672 InterlockedDecrement Sleep InterlockedIncrement 87788->87790 87788->87793 87789 42c737 InterlockedDecrement 87791 42c74a 87789->87791 87790->87788 87790->87793 87794 408f40 VariantClear 87791->87794 87792 42c731 87792->87789 87793->87789 87793->87792 88077 408e80 87793->88077 87796 42c752 87794->87796 88090 410c60 87796->88090 87799->86889 87801 42c6db 87802 402160 52 API calls 87801->87802 87803 42c6e5 87802->87803 87804 45340c 85 API calls 87803->87804 87805 42c6f1 87804->87805 88087 40d200 52 API calls 2 library calls 87805->88087 87807 42c6fb 88088 465124 53 API calls 87807->88088 87809 42c715 87810 42c76a 87809->87810 87811 42c719 87809->87811 87812 401b10 52 API calls 87810->87812 88089 46fe32 VariantClear 87811->88089 87814 42c77e 87812->87814 87815 401980 53 API calls 87814->87815 87816 42c796 87815->87816 87817 42c812 87816->87817 87821 42c864 87816->87821 88095 40ba10 87816->88095 88101 46fe32 VariantClear 87817->88101 87819 42c82a InterlockedDecrement 88102 46ff07 54 API calls 87819->88102 88103 45e737 90 API calls 3 library calls 87821->88103 87832 408f40 VariantClear 87835 42c891 87832->87835 87838 42c849 87839 42c874 87839->87832 87841 42ca59 87839->87841 87841->87841 87843 40afc4 87842->87843 87844 40b156 87842->87844 87845 40afd5 87843->87845 87846 42d1e3 87843->87846 88160 45e737 90 API calls 3 library calls 87844->88160 87851 40a780 199 API calls 87845->87851 87867 40b11a moneypunct 87845->87867 88161 45e737 90 API calls 3 library calls 87846->88161 87849 42d1f8 87855 408f40 VariantClear 87849->87855 87850 40b143 87850->86889 87852 40b00a 87851->87852 87852->87849 87856 40b012 87852->87856 87854 42d4db 87854->87854 87855->87850 87857 40b04a 87856->87857 87858 42d231 VariantClear 87856->87858 87865 40b094 moneypunct 87856->87865 87864 40b05c moneypunct 87857->87864 88162 40e270 VariantClear moneypunct 87857->88162 87858->87864 87859 40b108 87859->87867 88163 40e270 VariantClear moneypunct 87859->88163 87860 42d45a VariantClear 87860->87867 87863 4115d7 52 API calls 87863->87865 87864->87863 87864->87865 87865->87859 87866 42d425 moneypunct 87865->87866 87866->87860 87866->87867 87867->87850 88164 45e737 90 API calls 3 library calls 87867->88164 87869 408fff 87868->87869 87880 40900d 87868->87880 88211 403ea0 52 API calls __cinit 87869->88211 87872 42c3f6 88214 45e737 90 API calls 3 library calls 87872->88214 87874 40a780 199 API calls 87874->87880 87875 4090f2 moneypunct 87875->86889 87876 42c44a 88216 45e737 90 API calls 3 library calls 87876->88216 87879 42c47b 88217 451b42 61 API calls 87879->88217 87880->87872 87880->87874 87880->87875 87880->87876 87880->87879 87881 42c4cb 87880->87881 87882 42c564 87880->87882 87885 42c548 87880->87885 87888 409112 87880->87888 87890 42c528 87880->87890 87893 4090df 87880->87893 87894 4090ea 87880->87894 88213 4534e3 52 API calls 87880->88213 88215 40c4e0 199 API calls 87880->88215 88165 47faae 87881->88165 87886 408f40 VariantClear 87882->87886 88221 45e737 90 API calls 3 library calls 87885->88221 87886->87875 87887 42c491 87887->87875 88218 45e737 90 API calls 3 library calls 87887->88218 87888->87885 87896 40912b 87888->87896 88220 45e737 90 API calls 3 library calls 87890->88220 87891 42c4da 87891->87875 88219 45e737 90 API calls 3 library calls 87891->88219 87893->87894 87898 408e80 VariantClear 87893->87898 87899 408f40 VariantClear 87894->87899 87896->87875 88212 403e10 53 API calls 87896->88212 87898->87894 87899->87875 87901 40914b 87902 408f40 VariantClear 87901->87902 87902->87875 88408 408d90 87903->88408 87905 429778 87906 410c60 VariantClear 87905->87906 87907 429780 87906->87907 87908 408cf9 87908->87905 87909 42976c 87908->87909 87911 408d2d 87908->87911 88434 45e737 90 API calls 3 library calls 87909->88434 88424 403d10 87911->88424 87914 408d71 moneypunct 87914->86889 87915 408f40 VariantClear 87916 408d45 moneypunct 87915->87916 87916->87914 87916->87915 87919 425c87 87917->87919 87921 40d15f 87917->87921 87918 425cc7 87919->87918 87920 425ca1 TranslateAcceleratorW 87919->87920 87920->87921 87921->86889 87923 42602f 87922->87923 87926 40d17f 87922->87926 87923->86889 87924 40d18c 87924->86889 87925 42608e IsDialogMessageW 87925->87924 87925->87926 87926->87924 87926->87925 88648 430c46 GetClassLongW 87926->88648 87929 4096c6 _wcslen 87928->87929 87930 4115d7 52 API calls 87929->87930 87995 40a70c moneypunct _memmove 87929->87995 87931 4096fa _memmove 87930->87931 87932 4115d7 52 API calls 87931->87932 87934 40971b 87932->87934 87933 4013a0 52 API calls 87935 4297aa 87933->87935 87936 409749 CharUpperBuffW 87934->87936 87939 40976a moneypunct 87934->87939 87934->87995 87937 4115d7 52 API calls 87935->87937 87936->87939 87978 4297d1 _memmove 87937->87978 87985 4097e5 moneypunct 87939->87985 88650 47dcbb 201 API calls 87939->88650 87941 408f40 VariantClear 87942 42ae92 87941->87942 87943 410c60 VariantClear 87942->87943 87944 42aea4 87943->87944 87945 409aa2 87947 4115d7 52 API calls 87945->87947 87952 409afe 87945->87952 87945->87978 87946 40a689 87949 4115d7 52 API calls 87946->87949 87947->87952 87948 4115d7 52 API calls 87948->87985 87969 40a6af moneypunct _memmove 87949->87969 87950 409b2a 87954 429dbe 87950->87954 88003 409b4d moneypunct _memmove 87950->88003 88656 40b400 VariantClear VariantClear moneypunct 87950->88656 87951 40c2c0 52 API calls 87951->87985 87952->87950 87953 4115d7 52 API calls 87952->87953 87955 429d31 87953->87955 87959 429dd3 87954->87959 88657 40b400 VariantClear VariantClear moneypunct 87954->88657 87958 429d42 87955->87958 88653 44a801 52 API calls 87955->88653 87956 429a46 VariantClear 87956->87985 87967 40e0a0 52 API calls 87958->87967 87975 40e1c0 VariantClear 87959->87975 87959->88003 87960 408f40 VariantClear 87960->87985 87963 40a045 87965 4115d7 52 API calls 87963->87965 87964 42a3f5 88660 47390f VariantClear 87964->88660 87971 40a04c 87965->87971 87972 429d57 87967->87972 87976 4115d7 52 API calls 87969->87976 87977 40a0a7 87971->87977 87981 4091e0 316 API calls 87971->87981 88654 453443 52 API calls 87972->88654 87973 40ba10 52 API calls 87973->87985 87974 42a42f 88661 45e737 90 API calls 3 library calls 87974->88661 87975->88003 87976->87995 88000 40a0af 87977->88000 88662 40c790 VariantClear moneypunct 87977->88662 88673 45e737 90 API calls 3 library calls 87978->88673 87979 4299d9 87983 408f40 VariantClear 87979->87983 87981->87977 87982 429abd 87982->86889 87986 4299e2 87983->87986 87984 429d88 88655 453443 52 API calls 87984->88655 87985->87945 87985->87946 87985->87948 87985->87951 87985->87956 87985->87960 87985->87969 87985->87973 87985->87978 87985->87979 87985->87982 87991 40a780 199 API calls 87985->87991 87993 42a452 87985->87993 88651 40c4e0 199 API calls 87985->88651 88652 40e270 VariantClear moneypunct 87985->88652 87997 410c60 VariantClear 87986->87997 87991->87985 87992 402780 52 API calls 87992->88003 87993->87941 87995->87933 87996 44a801 52 API calls 87996->88003 87998 40a650 moneypunct 87997->87998 87998->86889 87999 408f40 VariantClear 88029 40a162 moneypunct _memmove 87999->88029 88002 40a11b 88000->88002 88005 42a4b4 VariantClear 88000->88005 88000->88029 88001 409c95 88001->86889 88011 40a12d moneypunct 88002->88011 88663 40e270 VariantClear moneypunct 88002->88663 88003->87964 88003->87974 88003->87992 88003->87995 88003->87996 88003->88001 88004 4115d7 52 API calls 88003->88004 88006 40a780 199 API calls 88003->88006 88008 401980 53 API calls 88003->88008 88009 408e80 VariantClear 88003->88009 88015 41130a 51 API calls __cinit 88003->88015 88019 409fd2 88003->88019 88658 45f508 52 API calls 88003->88658 88659 403e10 53 API calls 88003->88659 88004->88003 88005->88011 88006->88003 88008->88003 88009->88003 88010 4115d7 52 API calls 88010->88029 88011->88010 88011->88029 88012 408e80 VariantClear 88012->88029 88014 42a74d VariantClear 88014->88029 88015->88003 88016 40a368 88018 42aad4 88016->88018 88024 40a397 88016->88024 88017 40e270 VariantClear 88017->88029 88666 46fe90 VariantClear VariantClear moneypunct 88018->88666 88019->87963 88019->87964 88020 42a7e4 VariantClear 88020->88029 88021 42a886 VariantClear 88021->88029 88022 40a3ce 88035 40a3d9 moneypunct 88022->88035 88667 40b400 VariantClear VariantClear moneypunct 88022->88667 88024->88022 88048 40a42c moneypunct 88024->88048 88649 40b400 VariantClear VariantClear moneypunct 88024->88649 88027 42abaf 88031 42abd4 VariantClear 88027->88031 88042 40a4ee moneypunct 88027->88042 88028 4115d7 52 API calls 88032 42a5a6 VariantInit VariantCopy 88028->88032 88029->87999 88029->88012 88029->88014 88029->88016 88029->88017 88029->88018 88029->88020 88029->88021 88029->88028 88038 4115d7 52 API calls 88029->88038 88664 470870 52 API calls 88029->88664 88665 44ccf1 VariantClear moneypunct 88029->88665 88030 40a4dc 88030->88042 88669 40e270 VariantClear moneypunct 88030->88669 88031->88042 88032->88029 88037 42a5c6 VariantClear 88032->88037 88033 42ac4f 88043 42ac79 VariantClear 88033->88043 88049 40a546 moneypunct 88033->88049 88036 40a41a 88035->88036 88040 42ab44 VariantClear 88035->88040 88035->88048 88036->88048 88668 40e270 VariantClear moneypunct 88036->88668 88037->88029 88038->88029 88039 40a534 88039->88049 88670 40e270 VariantClear moneypunct 88039->88670 88040->88048 88042->88033 88042->88039 88043->88049 88044 42ad28 88050 42ad4e VariantClear 88044->88050 88054 40a583 moneypunct 88044->88054 88047 40a571 88047->88054 88671 40e270 VariantClear moneypunct 88047->88671 88048->88027 88048->88030 88049->88044 88049->88047 88050->88054 88052 42ae0e VariantClear 88052->88054 88054->87998 88054->88052 88055->86889 88056->86839 88057->86844 88058->86889 88059->86889 88060->86889 88061->86889 88062->86895 88063->86895 88064->86895 88065->86895 88066->86895 88067->86895 88068->86895 88070 403cdf 88069->88070 88071 408f40 VariantClear 88070->88071 88072 403ce7 88071->88072 88072->86883 88073->86895 88074->86895 88075->86889 88076->86836 88078 408e88 88077->88078 88080 408e94 88077->88080 88079 408f40 VariantClear 88078->88079 88079->88080 88081 45340c 88080->88081 88082 453439 88081->88082 88083 453419 88081->88083 88082->87801 88084 45342f 88083->88084 88147 4531b1 85 API calls 5 library calls 88083->88147 88084->87801 88086 453425 88086->87801 88087->87807 88088->87809 88089->87792 88091 428372 88090->88091 88092 410c73 moneypunct 88090->88092 88094 42838c 88091->88094 88148 40e1c0 88091->88148 88092->87799 88096 40ba49 88095->88096 88097 40ba1b moneypunct _memmove 88095->88097 88099 4115d7 52 API calls 88096->88099 88098 4115d7 52 API calls 88097->88098 88100 40ba22 88098->88100 88099->88097 88100->87816 88101->87819 88102->87838 88103->87839 88147->88086 88149 408f40 VariantClear 88148->88149 88150 40e1cb moneypunct 88149->88150 88150->88091 88160->87846 88161->87849 88162->87864 88163->87867 88164->87854 88166 408e80 VariantClear 88165->88166 88199 47fb02 88166->88199 88169 47fc59 88170 40a780 199 API calls 88169->88170 88173 47fc6a 88170->88173 88171 47fc2b 88174 408f40 VariantClear 88171->88174 88173->88171 88176 47fc7d 88173->88176 88177 47fc8c 88173->88177 88175 47fc33 88174->88175 88179 408f40 VariantClear 88175->88179 88263 45e737 90 API calls 3 library calls 88176->88263 88181 40ba10 52 API calls 88177->88181 88178 408f40 VariantClear 88178->88199 88182 47fc3b 88179->88182 88183 47fc98 88181->88183 88184 408f40 VariantClear 88182->88184 88264 47b2f4 144 API calls 88183->88264 88186 47fc43 88184->88186 88187 410c60 VariantClear 88186->88187 88191 47fc4b 88187->88191 88188 47fca7 88193 408f40 VariantClear 88188->88193 88189 47fcd4 88192 408f40 VariantClear 88189->88192 88190 408e80 VariantClear 88190->88199 88191->87891 88194 47fcdc 88192->88194 88195 47fcb1 88193->88195 88197 408f40 VariantClear 88194->88197 88196 408f40 VariantClear 88195->88196 88198 47fcb9 88196->88198 88200 47fce4 88197->88200 88201 408f40 VariantClear 88198->88201 88199->88169 88199->88171 88199->88178 88199->88189 88199->88190 88206 47fc1d 88199->88206 88222 475a67 88199->88222 88250 47b291 88199->88250 88261 46fe32 VariantClear 88199->88261 88202 408f40 VariantClear 88200->88202 88203 47fcc1 88201->88203 88204 47fcec 88202->88204 88205 410c60 VariantClear 88203->88205 88207 410c60 VariantClear 88204->88207 88208 47fcc9 88205->88208 88262 45e538 90 API calls 3 library calls 88206->88262 88210 47fcf4 88207->88210 88208->87891 88210->87891 88211->87880 88212->87901 88213->87880 88214->87875 88215->87880 88216->87875 88217->87887 88218->87875 88219->87875 88220->87875 88221->87882 88223 475ae5 88222->88223 88226 475ac5 88222->88226 88265 45e737 90 API calls 3 library calls 88223->88265 88225 475afe 88227 408f40 VariantClear 88225->88227 88226->88223 88228 475b42 88226->88228 88229 402780 52 API calls 88226->88229 88232 475b06 88227->88232 88230 402780 52 API calls 88228->88230 88229->88226 88240 475b60 88230->88240 88231 475c7c 88233 408f40 VariantClear 88231->88233 88232->88199 88237 475c84 88233->88237 88234 40c2c0 52 API calls 88234->88240 88235 40a780 199 API calls 88235->88240 88236 475cc7 88239 408f40 VariantClear 88236->88239 88237->88199 88238 40ba10 52 API calls 88238->88240 88243 475ca8 88239->88243 88240->88231 88240->88234 88240->88235 88240->88236 88240->88238 88241 475cd5 88240->88241 88242 408f40 VariantClear 88240->88242 88247 475ca0 88240->88247 88266 40c4e0 199 API calls 88240->88266 88267 45e737 90 API calls 3 library calls 88241->88267 88242->88240 88243->88199 88246 475ce8 88248 408f40 VariantClear 88246->88248 88249 408f40 VariantClear 88247->88249 88248->88243 88249->88243 88251 47b2e7 88250->88251 88252 47b2a5 88250->88252 88251->88199 88268 40e710 88252->88268 88255 47b2b7 88279 47974b 88255->88279 88256 47b2cf 88258 47974b 144 API calls 88256->88258 88260 47b2df 88258->88260 88259 47b2c7 88259->88199 88260->88199 88261->88199 88262->88171 88263->88171 88264->88188 88265->88225 88266->88240 88267->88246 88269 408f40 VariantClear 88268->88269 88270 40e71b 88269->88270 88271 4115d7 52 API calls 88270->88271 88272 40e729 88271->88272 88273 40e734 88272->88273 88274 426bdc 88272->88274 88275 401b10 52 API calls 88273->88275 88277 426be7 88273->88277 88276 40bc70 52 API calls 88274->88276 88274->88277 88278 40e743 88275->88278 88276->88277 88278->88255 88278->88256 88280 479aed 88279->88280 88281 479786 88279->88281 88348 451b42 61 API calls 88280->88348 88281->88280 88283 479798 88281->88283 88285 4797a2 88283->88285 88286 4797be 88283->88286 88284 479b00 88284->88259 88341 451b42 61 API calls 88285->88341 88288 4797c7 88286->88288 88289 4797e3 88286->88289 88342 451b42 61 API calls 88288->88342 88319 441eba 88289->88319 88290 4797b5 88290->88259 88293 4797da 88293->88259 88294 4797f7 88295 479815 88294->88295 88296 4797fe 88294->88296 88300 47983c 88295->88300 88324 451d2b 88295->88324 88343 451b42 61 API calls 88296->88343 88298 47980c 88298->88259 88304 4798e6 88300->88304 88335 479714 88300->88335 88301 47994b VariantInit 88304->88301 88305 479916 VariantClear 88304->88305 88305->88304 88320 441f12 88319->88320 88321 441ecc _wcslen 88319->88321 88320->88294 88321->88320 88322 410160 52 API calls 88321->88322 88323 441ede 88322->88323 88323->88294 88325 451d5e 88324->88325 88326 451e93 SysFreeString 88325->88326 88327 451d68 88325->88327 88333 451f21 88325->88333 88334 451ea0 88325->88334 88326->88334 88327->88300 88333->88334 88334->88327 88336 479728 88335->88336 88341->88290 88342->88293 88343->88298 88348->88284 88409 4289d2 88408->88409 88410 408db3 88408->88410 88439 45e737 90 API calls 3 library calls 88409->88439 88435 40bec0 88410->88435 88413 4289e5 88440 45e737 90 API calls 3 library calls 88413->88440 88414 408dc9 88414->88413 88416 40ba10 52 API calls 88414->88416 88417 428a05 88414->88417 88419 40a780 199 API calls 88414->88419 88420 408e64 88414->88420 88422 408f40 VariantClear 88414->88422 88423 408e5a 88414->88423 88416->88414 88418 408f40 VariantClear 88417->88418 88418->88423 88419->88414 88421 408f40 VariantClear 88420->88421 88421->88423 88422->88414 88423->87908 88425 408f40 VariantClear 88424->88425 88426 403d20 88425->88426 88427 403cd0 VariantClear 88426->88427 88428 403d4d 88427->88428 88430 4013c0 52 API calls 88428->88430 88442 477145 88428->88442 88447 4755ad 88428->88447 88450 46f8cb 88428->88450 88429 403d76 88429->87905 88429->87916 88430->88429 88434->87905 88436 40bed0 88435->88436 88437 40bef2 88436->88437 88441 45e737 90 API calls 3 library calls 88436->88441 88437->88414 88439->88413 88440->88417 88441->88437 88443 408e80 VariantClear 88442->88443 88444 47715a 88443->88444 88469 467ac4 88444->88469 88446 477160 88446->88429 88492 475077 88447->88492 88449 4755c0 88449->88429 88451 46f8e7 88450->88451 88452 46f978 88450->88452 88453 46f900 88451->88453 88454 46f8ee 88451->88454 88455 46f93c 88451->88455 88456 46f91a 88451->88456 88452->88429 88457 45340c 85 API calls 88453->88457 88460 45340c 85 API calls 88454->88460 88459 45340c 85 API calls 88455->88459 88458 45340c 85 API calls 88456->88458 88457->88454 88461 46f931 88458->88461 88462 46f958 88459->88462 88463 46f971 88460->88463 88464 45340c 85 API calls 88461->88464 88465 45340c 85 API calls 88462->88465 88598 46cb5f 88463->88598 88464->88454 88467 46f95f 88465->88467 88468 45340c 85 API calls 88467->88468 88468->88454 88470 467bb8 88469->88470 88471 467adc 88469->88471 88470->88446 88472 467c16 88471->88472 88473 467b90 88471->88473 88474 467c1d 88471->88474 88482 467aed 88471->88482 88491 40e270 VariantClear moneypunct 88472->88491 88477 4115d7 52 API calls 88473->88477 88476 4115d7 52 API calls 88474->88476 88488 467b75 _memmove 88476->88488 88477->88488 88478 467b55 88480 4115d7 52 API calls 88478->88480 88479 4115d7 52 API calls 88479->88470 88481 467b5b 88480->88481 88489 442ee0 52 API calls 88481->88489 88484 4115d7 52 API calls 88482->88484 88487 467b28 moneypunct 88482->88487 88484->88487 88485 467b6b 88490 45f645 54 API calls moneypunct 88485->88490 88487->88474 88487->88478 88487->88488 88488->88479 88489->88485 88490->88488 88491->88474 88545 4533eb 88492->88545 88495 4750ee 88497 408f40 VariantClear 88495->88497 88496 475129 88549 4646e0 88496->88549 88503 4750f5 88497->88503 88499 47515e 88500 475162 88499->88500 88527 47518e 88499->88527 88503->88449 88546 453404 88545->88546 88547 4533f8 88545->88547 88546->88495 88546->88496 88547->88546 88592 4531b1 85 API calls 5 library calls 88547->88592 88593 4536f7 53 API calls 88549->88593 88551 4646fc 88594 4426cd 59 API calls _wcslen 88551->88594 88553 464711 88555 40bc70 52 API calls 88553->88555 88561 46474b 88553->88561 88556 46472c 88555->88556 88595 461465 52 API calls _memmove 88556->88595 88558 464741 88560 464793 88560->88499 88561->88560 88596 463ad5 64 API calls __wcsicoll 88561->88596 88592->88546 88593->88551 88594->88553 88595->88558 88596->88560 88599 40bc70 52 API calls 88598->88599 88600 46cb7e 88599->88600 88601 40bc70 52 API calls 88600->88601 88602 46cb86 88601->88602 88603 40bc70 52 API calls 88602->88603 88604 46cb91 88603->88604 88605 408f40 VariantClear 88604->88605 88648->87926 88649->88022 88650->87939 88651->87985 88652->87985 88653->87958 88654->87984 88655->87950 88656->87954 88657->87959 88658->88003 88659->88003 88660->87974 88661->87993 88662->87977 88663->88011 88664->88029 88665->88029 88666->88022 88667->88035 88668->88048 88669->88042 88670->88049 88671->88054 88673->87993 88674 42d154 88678 480a8d 88674->88678 88676 42d161 88677 480a8d 199 API calls 88676->88677 88677->88676 88679 480ae4 88678->88679 88680 480b26 88678->88680 88682 480aeb 88679->88682 88683 480b15 88679->88683 88681 40bc70 52 API calls 88680->88681 88701 480b2e 88681->88701 88685 480aee 88682->88685 88686 480b04 88682->88686 88711 4805bf 199 API calls 88683->88711 88685->88680 88688 480af3 88685->88688 88710 47fea2 199 API calls __itow_s 88686->88710 88709 47f135 199 API calls 88688->88709 88689 40e0a0 52 API calls 88689->88701 88692 408f40 VariantClear 88694 481156 88692->88694 88693 480aff 88693->88692 88695 408f40 VariantClear 88694->88695 88696 48115e 88695->88696 88696->88676 88697 40e710 53 API calls 88697->88701 88698 401980 53 API calls 88698->88701 88700 40c2c0 52 API calls 88700->88701 88701->88689 88701->88693 88701->88697 88701->88698 88701->88700 88702 408e80 VariantClear 88701->88702 88703 40a780 199 API calls 88701->88703 88704 480ff5 88701->88704 88712 45377f 52 API calls 88701->88712 88713 45e951 53 API calls 88701->88713 88714 40e830 53 API calls 88701->88714 88715 47925f 53 API calls 88701->88715 88716 47fcff 199 API calls 88701->88716 88702->88701 88703->88701 88717 45e737 90 API calls 3 library calls 88704->88717 88709->88693 88710->88693 88711->88693 88712->88701 88713->88701 88714->88701 88715->88701 88716->88701 88717->88693 88718 42b14b 88725 40bc10 88718->88725 88720 42b159 88721 4096a0 330 API calls 88720->88721 88722 42b177 88721->88722 88736 44b92d VariantClear 88722->88736 88724 42bc5b 88726 40bc24 88725->88726 88727 40bc17 88725->88727 88728 40bc2a 88726->88728 88729 40bc3c 88726->88729 88730 408e80 VariantClear 88727->88730 88731 408e80 VariantClear 88728->88731 88732 4115d7 52 API calls 88729->88732 88733 40bc1f 88730->88733 88734 40bc33 88731->88734 88735 40bc43 88732->88735 88733->88720 88734->88720 88735->88720 88736->88724 88737 425b2b 88742 40f000 88737->88742 88741 425b3a 88743 4115d7 52 API calls 88742->88743 88744 40f007 88743->88744 88745 4276ea 88744->88745 88751 40f030 88744->88751 88750 41130a 51 API calls __cinit 88750->88741 88752 40f039 88751->88752 88753 40f01a 88751->88753 88781 41130a 51 API calls __cinit 88752->88781 88755 40e500 88753->88755 88756 40bc70 52 API calls 88755->88756 88757 40e515 GetVersionExW 88756->88757 88758 402160 52 API calls 88757->88758 88759 40e557 88758->88759 88782 40e660 88759->88782 88763 427674 88769 4276c6 GetSystemInfo 88763->88769 88767 40e5e0 88771 4276d5 GetSystemInfo 88767->88771 88796 40efd0 88767->88796 88768 40e5cd GetCurrentProcess 88803 40ef20 LoadLibraryA GetProcAddress 88768->88803 88769->88771 88774 40e629 88800 40ef90 88774->88800 88777 40e641 FreeLibrary 88778 40e644 88777->88778 88779 40e653 FreeLibrary 88778->88779 88780 40e656 88778->88780 88779->88780 88780->88750 88781->88753 88783 40e667 88782->88783 88784 42761d 88783->88784 88785 40c600 52 API calls 88783->88785 88786 40e55c 88785->88786 88787 40e680 88786->88787 88788 40e687 88787->88788 88789 427616 88788->88789 88790 40c600 52 API calls 88788->88790 88791 40e566 88790->88791 88791->88763 88792 40ef60 88791->88792 88793 40e5c8 88792->88793 88794 40ef66 LoadLibraryA 88792->88794 88793->88767 88793->88768 88794->88793 88795 40ef77 GetProcAddress 88794->88795 88795->88793 88797 40e620 88796->88797 88798 40efd6 LoadLibraryA 88796->88798 88797->88769 88797->88774 88798->88797 88799 40efe7 GetProcAddress 88798->88799 88799->88797 88804 40efb0 LoadLibraryA GetProcAddress 88800->88804 88802 40e632 GetNativeSystemInfo 88802->88777 88802->88778 88803->88767 88804->88802 88805 41a7c10 88806 41a5860 GetPEB 88805->88806 88807 41a7d0f 88806->88807 88819 41a7b00 88807->88819 88820 41a7b09 Sleep 88819->88820 88821 41a7b17 88820->88821 88822 425b5e 88827 40c7f0 88822->88827 88826 425b6d 88862 40db10 52 API calls 88827->88862 88829 40c82a 88863 410ab0 6 API calls 88829->88863 88831 40c86d 88832 40bc70 52 API calls 88831->88832 88833 40c877 88832->88833 88834 40bc70 52 API calls 88833->88834 88835 40c881 88834->88835 88836 40bc70 52 API calls 88835->88836 88837 40c88b 88836->88837 88838 40bc70 52 API calls 88837->88838 88839 40c8d1 88838->88839 88840 40bc70 52 API calls 88839->88840 88841 40c991 88840->88841 88864 40d2c0 52 API calls 88841->88864 88843 40c99b 88865 40d0d0 53 API calls 88843->88865 88845 40c9c1 88846 40bc70 52 API calls 88845->88846 88847 40c9cb 88846->88847 88866 40e310 53 API calls 88847->88866 88849 40ca28 88850 408f40 VariantClear 88849->88850 88851 40ca30 88850->88851 88852 408f40 VariantClear 88851->88852 88853 40ca38 GetStdHandle 88852->88853 88854 429630 88853->88854 88855 40ca87 88853->88855 88854->88855 88856 429639 88854->88856 88861 41130a 51 API calls __cinit 88855->88861 88867 4432c0 57 API calls 88856->88867 88858 429641 88868 44b6ab CreateThread 88858->88868 88860 42964f CloseHandle 88860->88855 88861->88826 88862->88829 88863->88831 88864->88843 88865->88845 88866->88849 88867->88858 88868->88860 88869 44b5cb 58 API calls 88868->88869 88870 425b6f 88875 40dc90 88870->88875 88874 425b7e 88876 40bc70 52 API calls 88875->88876 88877 40dd03 88876->88877 88883 40f210 88877->88883 88880 40dd96 88881 40ddb7 88880->88881 88886 40dc00 52 API calls 2 library calls 88880->88886 88882 41130a 51 API calls __cinit 88881->88882 88882->88874 88887 40f250 RegOpenKeyExW 88883->88887 88885 40f230 88885->88880 88886->88880 88888 425e17 88887->88888 88889 40f275 RegQueryValueExW 88887->88889 88888->88885 88890 40f2c3 RegCloseKey 88889->88890 88891 40f298 88889->88891 88890->88885 88892 40f2a9 RegCloseKey 88891->88892 88893 425e1d 88891->88893 88892->88885
            APIs
            • _wcslen.LIBCMT ref: 004096C1
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 0040970C
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
            • _memmove.LIBCMT ref: 00409D96
            • _memmove.LIBCMT ref: 0040A6C4
            • _memmove.LIBCMT ref: 004297E5
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
            • String ID:
            • API String ID: 2383988440-0
            • Opcode ID: 5f0abc163b241baeb720074264f7b9bbeee8bf9689a4a8b19dada1d66a40ba92
            • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
            • Opcode Fuzzy Hash: 5f0abc163b241baeb720074264f7b9bbeee8bf9689a4a8b19dada1d66a40ba92
            • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

            Control-flow Graph

            APIs
            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
              • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,00000104,?), ref: 00401F4C
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
              • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
            • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
            • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
              • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
            • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
            • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
              • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
              • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
              • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
              • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
              • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
              • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
            • String ID: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
            • API String ID: 2495805114-2936829951
            • Opcode ID: 72fb05aec3bb303782bad09735a5a24f9beaa233d9fb702dad6034791cb84eb1
            • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
            • Opcode Fuzzy Hash: 72fb05aec3bb303782bad09735a5a24f9beaa233d9fb702dad6034791cb84eb1
            • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1531 46cc96-46cca1 1528->1531 1538 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1538 1529->1531 1532 46cc62-46cc8b call 43119b 1529->1532 1533 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1533 1531->1533 1550 46cc8e-46cc90 1532->1550 1552 46cdf4 1538->1552 1553 46ccfd-46cd1f call 402160 call 431a2b 1538->1553 1550->1531 1554 46ceb7-46cef0 call 468070 call 402250 * 3 1550->1554 1558 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1552->1558 1568 46cd35-46cd41 call 465177 1553->1568 1569 46cd21-46cd33 1553->1569 1558->1531 1564 46ce50-46ce55 1558->1564 1564->1531 1567 46ce5b-46ce62 1564->1567 1571 46ce64-46ce8b CoSetProxyBlanket 1567->1571 1572 46ce8d-46ce9e 1567->1572 1579 46cd46-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1568->1579 1573 46cda5-46cdaa 1569->1573 1571->1572 1572->1550 1576 46cea4-46ceb2 1572->1576 1577 46cdac-46cdbb call 4111c1 1573->1577 1578 46cdbd-46cdc0 1573->1578 1576->1533 1582 46cdc3-46cdf2 1577->1582 1578->1582 1579->1573 1582->1558
            APIs
            • OleInitialize.OLE32(00000000), ref: 0046CBC7
            • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
            • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
            • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
            • _wcslen.LIBCMT ref: 0046CDB0
            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
            • CoTaskMemFree.OLE32(?), ref: 0046CE42
            • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
              • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
              • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
              • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
            Strings
            • NULL Pointer assignment, xrefs: 0046CEA6
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
            • String ID: NULL Pointer assignment
            • API String ID: 440038798-2785691316
            • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
            • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
            • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2002 427693-427696 1997->2002 2003 427688-427691 1997->2003 2001 4276b4-4276be 1998->2001 2004 427625-427629 1999->2004 2005 40e59c-40e59f 1999->2005 2013 40e5ec-40e60c 2000->2013 2014 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2014 2015 4276c6-4276ca GetSystemInfo 2001->2015 2002->2001 2011 427698-4276a8 2002->2011 2003->2001 2007 427636-427640 2004->2007 2008 42762b-427631 2004->2008 2009 40e5a5-40e5ae 2005->2009 2010 427654-427657 2005->2010 2007->2000 2008->2000 2017 40e5b4 2009->2017 2018 427645-42764f 2009->2018 2010->2000 2016 42765d-42766f 2010->2016 2019 4276b0 2011->2019 2020 4276aa-4276ae 2011->2020 2022 40e612-40e623 call 40efd0 2013->2022 2023 4276d5-4276df GetSystemInfo 2013->2023 2014->2013 2029 40e5e8 2014->2029 2015->2023 2016->2000 2017->2000 2018->2000 2019->2001 2020->2001 2022->2015 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2029->2013 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
            APIs
            • GetVersionExW.KERNEL32(?), ref: 0040E52A
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
            • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
            • FreeLibrary.KERNEL32(?), ref: 0040E642
            • FreeLibrary.KERNEL32(?), ref: 0040E654
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
            • String ID: 0SH
            • API String ID: 3363477735-851180471
            • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
            • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
            • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
            APIs
            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: IsThemeActive$uxtheme.dll
            • API String ID: 2574300362-3542929980
            • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
            • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
            • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
            • Sleep.KERNEL32(0000000A,?), ref: 004094D1
            • TranslateMessage.USER32(?), ref: 00409556
            • DispatchMessageW.USER32(?), ref: 00409561
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Message$Peek$DispatchSleepTranslate
            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
            • API String ID: 1762048999-758534266
            • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
            • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
            • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
            • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

            Control-flow Graph

            APIs
            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,00000104,?), ref: 00401F4C
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • __wcsicoll.LIBCMT ref: 00402007
            • __wcsicoll.LIBCMT ref: 0040201D
            • __wcsicoll.LIBCMT ref: 00402033
              • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
            • __wcsicoll.LIBCMT ref: 00402049
            • _wcscpy.LIBCMT ref: 0040207C
            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,00000104), ref: 00428B5B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe$CMDLINE$CMDLINERAW
            • API String ID: 3948761352-1884443223
            • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
            • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
            • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
            • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __fread_nolock$_fseek_wcscpy
            • String ID: D)E$D)E$FILE
            • API String ID: 3888824918-361185794
            • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
            • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
            • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

            Control-flow Graph

            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
            • __wsplitpath.LIBCMT ref: 0040E41C
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcsncat.LIBCMT ref: 0040E433
            • __wmakepath.LIBCMT ref: 0040E44F
              • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • _wcscpy.LIBCMT ref: 0040E487
              • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • _wcscat.LIBCMT ref: 00427541
            • _wcslen.LIBCMT ref: 00427551
            • _wcslen.LIBCMT ref: 00427562
            • _wcscat.LIBCMT ref: 0042757C
            • _wcsncpy.LIBCMT ref: 004275BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
            • String ID: Include$\
            • API String ID: 3173733714-3429789819
            • Opcode ID: 7e361b3e195ecd6f30d71efcae858d2a0a6e930e28d9c4f54052f3c76b1711e3
            • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
            • Opcode Fuzzy Hash: 7e361b3e195ecd6f30d71efcae858d2a0a6e930e28d9c4f54052f3c76b1711e3
            • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

            Control-flow Graph

            APIs
            • _fseek.LIBCMT ref: 0045292B
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
            • __fread_nolock.LIBCMT ref: 00452961
            • __fread_nolock.LIBCMT ref: 00452971
            • __fread_nolock.LIBCMT ref: 0045298A
            • __fread_nolock.LIBCMT ref: 004529A5
            • _fseek.LIBCMT ref: 004529BF
            • _malloc.LIBCMT ref: 004529CA
            • _malloc.LIBCMT ref: 004529D6
            • __fread_nolock.LIBCMT ref: 004529E7
            • _free.LIBCMT ref: 00452A17
            • _free.LIBCMT ref: 00452A20
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
            • String ID:
            • API String ID: 1255752989-0
            • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
            • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
            • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 004104C3
            • RegisterClassExW.USER32(00000030), ref: 004104ED
            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
            • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
            • LoadIconW.USER32(00400000,000000A9), ref: 00410542
            • ImageList_ReplaceIcon.COMCTL32(00B71020,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
            • API String ID: 2914291525-1005189915
            • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
            • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
            • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

            Control-flow Graph

            APIs
            • GetSysColorBrush.USER32(0000000F), ref: 0041039B
            • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
            • LoadIconW.USER32(?,00000063), ref: 004103C0
            • LoadIconW.USER32(?,000000A4), ref: 004103D3
            • LoadIconW.USER32(?,000000A2), ref: 004103E6
            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
            • RegisterClassExW.USER32(?), ref: 0041045D
              • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
              • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
              • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
              • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
              • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
              • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
              • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00B71020,000000FF,00000000), ref: 00410552
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
            • String ID: #$0$AutoIt v3
            • API String ID: 423443420-4155596026
            • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
            • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
            • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _malloc
            • String ID: Default
            • API String ID: 1579825452-753088835
            • Opcode ID: 686d4f57f13271a1b79ede908c7440ec237636b914f706902fa85cba7b54b38d
            • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
            • Opcode Fuzzy Hash: 686d4f57f13271a1b79ede908c7440ec237636b914f706902fa85cba7b54b38d
            • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2055 40f679-40f67c 2051->2055 2054 40f640 2052->2054 2056 40f642-40f650 2054->2056 2055->2045 2057 40f652-40f655 2056->2057 2058 40f67e-40f68c 2056->2058 2061 40f65b-40f65e 2057->2061 2062 425d1e-425d3e call 4150d1 call 414d04 2057->2062 2059 40f68e-40f68f 2058->2059 2060 40f69f-40f6ad 2058->2060 2059->2057 2064 40f6b4-40f6c2 2060->2064 2065 40f6af-40f6b2 2060->2065 2061->2051 2061->2054 2072 425d43-425d5f call 414d30 2062->2072 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2062 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2056 2073 425d11 2070->2073 2071->2057 2072->2050 2073->2067
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __fread_nolock_fseek_memmove_strcat
            • String ID: AU3!$EA06
            • API String ID: 1268643489-2658333250
            • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
            • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
            • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2079 401144-40114a 2077->2079 2080 40111b-40111e 2077->2080 2078->2077 2081 401182 2078->2081 2083 401184-40118e call 401250 2079->2083 2084 40114c-40114f 2079->2084 2080->2079 2082 401120-401126 2080->2082 2085 40112c-401141 DefWindowProcW 2081->2085 2082->2085 2086 42b038-42b03f 2082->2086 2095 401193-40119a 2083->2095 2087 401151-401157 2084->2087 2088 40119d 2084->2088 2086->2085 2094 42b045-42b059 call 401000 call 40e0c0 2086->2094 2092 401219-40121f 2087->2092 2093 40115d 2087->2093 2090 4011a3-4011a9 2088->2090 2091 42afb4-42afc5 call 40f190 2088->2091 2090->2082 2096 4011af 2090->2096 2091->2095 2092->2082 2099 401225-42b06d call 468b0e 2092->2099 2097 401163-401166 2093->2097 2098 42b01d-42b024 2093->2098 2094->2085 2096->2082 2102 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2096->2102 2103 4011db-401202 SetTimer RegisterWindowMessageW 2096->2103 2105 42afe9-42b018 call 40f190 call 401a50 2097->2105 2106 40116c-401172 2097->2106 2098->2085 2104 42b02a-42b033 call 4370f4 2098->2104 2099->2095 2103->2095 2113 401204-401216 CreatePopupMenu 2103->2113 2104->2085 2105->2085 2106->2082 2115 401174-42afde call 45fd57 2106->2115 2115->2085 2127 42afe4 2115->2127 2127->2095
            APIs
            • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
            • KillTimer.USER32(?,00000001,?), ref: 004011B9
            • PostQuitMessage.USER32(00000000), ref: 004011CB
            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
            • CreatePopupMenu.USER32 ref: 00401204
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
            • String ID: TaskbarCreated
            • API String ID: 129472671-2362178303
            • Opcode ID: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
            • Opcode Fuzzy Hash: cce8c5a03ea04b09f31441a39b36d20ef7a6309a2ce36e618d98c5e601e7cd17
            • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
            APIs
            • _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • std::exception::exception.LIBCMT ref: 00411626
            • std::exception::exception.LIBCMT ref: 00411640
            • __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
            • String ID: ,*H$4*H$@fI
            • API String ID: 615853336-1459471987
            • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
            • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
            • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2147 41a7e90-41a7f3e call 41a5860 2150 41a7f45-41a7f6b call 41a8da0 CreateFileW 2147->2150 2153 41a7f6d 2150->2153 2154 41a7f72-41a7f82 2150->2154 2155 41a80bd-41a80c1 2153->2155 2161 41a7f89-41a7fa3 VirtualAlloc 2154->2161 2162 41a7f84 2154->2162 2156 41a8103-41a8106 2155->2156 2157 41a80c3-41a80c7 2155->2157 2163 41a8109-41a8110 2156->2163 2159 41a80c9-41a80cc 2157->2159 2160 41a80d3-41a80d7 2157->2160 2159->2160 2164 41a80d9-41a80e3 2160->2164 2165 41a80e7-41a80eb 2160->2165 2166 41a7faa-41a7fc1 ReadFile 2161->2166 2167 41a7fa5 2161->2167 2162->2155 2168 41a8112-41a811d 2163->2168 2169 41a8165-41a817a 2163->2169 2164->2165 2172 41a80fb 2165->2172 2173 41a80ed-41a80f7 2165->2173 2174 41a7fc8-41a8008 VirtualAlloc 2166->2174 2175 41a7fc3 2166->2175 2167->2155 2176 41a811f 2168->2176 2177 41a8121-41a812d 2168->2177 2170 41a818a-41a8192 2169->2170 2171 41a817c-41a8187 VirtualFree 2169->2171 2171->2170 2172->2156 2173->2172 2180 41a800a 2174->2180 2181 41a800f-41a802a call 41a8ff0 2174->2181 2175->2155 2176->2169 2178 41a812f-41a813f 2177->2178 2179 41a8141-41a814d 2177->2179 2182 41a8163 2178->2182 2183 41a815a-41a8160 2179->2183 2184 41a814f-41a8158 2179->2184 2180->2155 2187 41a8035-41a803f 2181->2187 2182->2163 2183->2182 2184->2182 2188 41a8072-41a8086 call 41a8e00 2187->2188 2189 41a8041-41a8070 call 41a8ff0 2187->2189 2195 41a808a-41a808e 2188->2195 2196 41a8088 2188->2196 2189->2187 2197 41a809a-41a809e 2195->2197 2198 41a8090-41a8094 CloseHandle 2195->2198 2196->2155 2199 41a80ae-41a80b7 2197->2199 2200 41a80a0-41a80ab VirtualFree 2197->2200 2198->2197 2199->2150 2199->2155 2200->2199
            APIs
            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 041A7F61
            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 041A8187
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateFileFreeVirtual
            • String ID:
            • API String ID: 204039940-0
            • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
            • Instruction ID: ee85589082a7ed9f81e69710010888ed1f1c984c46ee91634c85d0c32e4d3fac
            • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
            • Instruction Fuzzy Hash: E6A11974E00209EFDB14DFA4C998BEEBBB5BF48304F208199E511BB280D775AA51CB65

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2201 4102b0-4102c5 SHGetMalloc 2202 4102cb-4102da SHGetDesktopFolder 2201->2202 2203 425dfd-425e0e call 433244 2201->2203 2204 4102e0-41031a call 412fba 2202->2204 2205 41036b-410379 2202->2205 2213 410360-410368 2204->2213 2214 41031c-410331 SHGetPathFromIDListW 2204->2214 2205->2203 2211 41037f-410384 2205->2211 2213->2205 2215 410351-41035d 2214->2215 2216 410333-41034a call 412fba 2214->2216 2215->2213 2216->2215
            APIs
            • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
            • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
            • _wcsncpy.LIBCMT ref: 004102ED
            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
            • _wcsncpy.LIBCMT ref: 00410340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcsncpy$DesktopFolderFromListMallocPath
            • String ID: C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
            • API String ID: 3170942423-3696193414
            • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
            • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
            • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 2219 401250-40125c 2220 401262-401293 call 412f40 call 401b80 2219->2220 2221 4012e8-4012ed 2219->2221 2226 4012d1-4012e2 KillTimer SetTimer 2220->2226 2227 401295-4012b5 2220->2227 2226->2221 2228 4012bb-4012bf 2227->2228 2229 4272ec-4272f2 2227->2229 2230 4012c5-4012cb 2228->2230 2231 42733f-427346 2228->2231 2232 4272f4-427315 Shell_NotifyIconW 2229->2232 2233 42731a-42733a Shell_NotifyIconW 2229->2233 2230->2226 2234 427393-4273b4 Shell_NotifyIconW 2230->2234 2235 427348-427369 Shell_NotifyIconW 2231->2235 2236 42736e-42738e Shell_NotifyIconW 2231->2236 2232->2226 2233->2226 2234->2226 2235->2226 2236->2226
            APIs
              • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
              • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
              • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
            • String ID:
            • API String ID: 3300667738-0
            • Opcode ID: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
            • Opcode Fuzzy Hash: 4b14c7d07e087387f8a3c98a8cd4bd71866d27c85158e2001d1b6fa40e2d0dfa
            • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
            APIs
            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
            • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: QueryValue$CloseOpen
            • String ID: Include$Software\AutoIt v3\AutoIt
            • API String ID: 1586453840-614718249
            • Opcode ID: 1d27a7508ccdfe51d261e4be39e615bcb39a538e4c620ec5280d8b0efb731e35
            • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
            • Opcode Fuzzy Hash: 1d27a7508ccdfe51d261e4be39e615bcb39a538e4c620ec5280d8b0efb731e35
            • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
            APIs
            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
            • ShowWindow.USER32(?,00000000), ref: 004105E4
            • ShowWindow.USER32(?,00000000), ref: 004105EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$CreateShow
            • String ID: AutoIt v3$edit
            • API String ID: 1584632944-3779509399
            • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
            • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
            • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorLast
            • String ID: NULL Pointer assignment$Not an Object type
            • API String ID: 2487901850-572801152
            • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
            • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
            • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
            APIs
              • Part of subcall function 041A7B00: Sleep.KERNELBASE(000001F4), ref: 041A7B11
            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 041A7D7B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateFileSleep
            • String ID: 80AZBH6NYPZVPL3WC5TF2N63FQ87BZ
            • API String ID: 2694422964-1283301443
            • Opcode ID: 7ffaceaef2214545ed85b00f0aca0b35af3e1deec2f2b1dce1b6bb7c2a8ac81b
            • Instruction ID: c6e3109f6460431ccd5f3a8c967401087237878a2c3b54040209b66c4ee52880
            • Opcode Fuzzy Hash: 7ffaceaef2214545ed85b00f0aca0b35af3e1deec2f2b1dce1b6bb7c2a8ac81b
            • Instruction Fuzzy Hash: 3E61A430E04288DAEF11CBB4C854BEFBB75AF15304F044199E2587B2C0D7BA5B49CBA6
            APIs
            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcsncpy.LIBCMT ref: 00401C41
            • _wcscpy.LIBCMT ref: 00401C5D
            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
            • String ID: Line:
            • API String ID: 1874344091-1585850449
            • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
            • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
            • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
            APIs
            • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
            • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
            • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
            • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Close$OpenQueryValue
            • String ID: Control Panel\Mouse
            • API String ID: 1607946009-824357125
            • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
            • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
            • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 041A72BB
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 041A7351
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 041A7373
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: 932a8f43b2c324a6e880b45aa11ae59a53f266e36399e6caa3e7e9a692624255
            • Instruction ID: f12e0b47693e4dbd2c48fac020fdbbb76cd9c7e70234ade2b3dcba4857198442
            • Opcode Fuzzy Hash: 932a8f43b2c324a6e880b45aa11ae59a53f266e36399e6caa3e7e9a692624255
            • Instruction Fuzzy Hash: 4F620B34A142589BEB24DFA4C880BDEB372EF58300F1091A9D11DEB3D0E775AE91CB59
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
            • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
            • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
            APIs
            • VariantInit.OLEAUT32(?), ref: 0047950F
            • SysAllocString.OLEAUT32(00000000), ref: 004795D8
            • VariantCopy.OLEAUT32(?,?), ref: 0047960F
            • VariantClear.OLEAUT32(?), ref: 00479650
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$AllocClearCopyInitString
            • String ID:
            • API String ID: 2808897238-0
            • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
            • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
            • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
            APIs
              • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
            • _free.LIBCMT ref: 004295A0
              • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
              • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
              • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
              • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
              • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
            • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
            • API String ID: 3938964917-429154562
            • Opcode ID: 679171b487d5c88dda29f7472751386f9807822ff68bb396118558e7f850fbce
            • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
            • Opcode Fuzzy Hash: 679171b487d5c88dda29f7472751386f9807822ff68bb396118558e7f850fbce
            • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: Error:
            • API String ID: 4104443479-232661952
            • Opcode ID: 05a8bb3239cd95c3ebc78f8148cc2b90f6a11ce9cadf0c832a59df9964cf9f18
            • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
            • Opcode Fuzzy Hash: 05a8bb3239cd95c3ebc78f8148cc2b90f6a11ce9cadf0c832a59df9964cf9f18
            • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
            APIs
            • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,0040F545,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,004A90E8,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,?,0040F545), ref: 0041013C
              • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
              • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
              • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
              • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
            • String ID: X$pWH
            • API String ID: 85490731-941433119
            • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
            • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
            • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
            Strings
            • C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, xrefs: 00410107
            • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _strcat
            • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
            • API String ID: 1765576173-1066308181
            • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
            • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
            • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
            • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
            • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __filbuf__getptd_noexit__read_memcpy_s
            • String ID:
            • API String ID: 1794320848-0
            • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
            • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
            • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
            APIs
            • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
            • TerminateProcess.KERNEL32(00000000), ref: 004753CE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$CurrentTerminate
            • String ID:
            • API String ID: 2429186680-0
            • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
            • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
            • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
            APIs
            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: IconNotifyShell_
            • String ID:
            • API String ID: 1144537725-0
            • Opcode ID: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction ID: eb3a406907b17a2fb372061a5351d340f380801689ea858bebf243c914dbfa85
            • Opcode Fuzzy Hash: 02018e3f435d091181cdea07546ede041b4d96144d17d916b2823846d4297506
            • Instruction Fuzzy Hash: 16318F70608701DFD320CF25D855797BBE4BB85314F000C3EE5AA87391E7B8A958CB5A
            APIs
            • _malloc.LIBCMT ref: 0043214B
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _malloc.LIBCMT ref: 0043215D
            • _malloc.LIBCMT ref: 0043216F
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _malloc$AllocateHeap
            • String ID:
            • API String ID: 680241177-0
            • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
            • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
            • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
            APIs
            • TranslateMessage.USER32(?), ref: 00409556
            • DispatchMessageW.USER32(?), ref: 00409561
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Message$DispatchPeekTranslate
            • String ID:
            • API String ID: 4217535847-0
            • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
            • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
            • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
            • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: fec6c4bcd8e4398365b3bb9f8c862bd53424f51362970eee187c320733aade43
            • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
            • Opcode Fuzzy Hash: fec6c4bcd8e4398365b3bb9f8c862bd53424f51362970eee187c320733aade43
            • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 4f4b888fe887a92c3e2a1492f249f15f63fe38875899ea6428f69213d2abc75e
            • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
            • Opcode Fuzzy Hash: 4f4b888fe887a92c3e2a1492f249f15f63fe38875899ea6428f69213d2abc75e
            • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
            APIs
              • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
            • _strcat.LIBCMT ref: 0040F786
              • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
            • String ID:
            • API String ID: 3199840319-0
            • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
            • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
            • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
            • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
            APIs
            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
            • FreeLibrary.KERNEL32(?), ref: 0040D78E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FreeInfoLibraryParametersSystem
            • String ID:
            • API String ID: 3403648963-0
            • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
            • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
            • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
            APIs
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            • __lock_file.LIBCMT ref: 00414A8D
              • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
            • __fclose_nolock.LIBCMT ref: 00414A98
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
            • String ID:
            • API String ID: 2800547568-0
            • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
            • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
            • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
            APIs
            • __lock_file.LIBCMT ref: 00415012
            • __ftell_nolock.LIBCMT ref: 0041501F
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __ftell_nolock__getptd_noexit__lock_file
            • String ID:
            • API String ID: 2999321469-0
            • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
            • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
            • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
            APIs
            • CreateProcessW.KERNELBASE(?,00000000), ref: 041A72BB
            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 041A7351
            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 041A7373
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$ContextCreateMemoryReadThreadWow64
            • String ID:
            • API String ID: 2438371351-0
            • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
            • Instruction ID: 622f420a3847984355d4d12ea89be95897794a4d6864db664da992e385a2e7b4
            • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
            • Instruction Fuzzy Hash: B912EF24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A4E77A5F91CF5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 0dc2fc951f3a33477071b3777001db4296cbb315477624789133fea0400dd9e8
            • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
            • Opcode Fuzzy Hash: 0dc2fc951f3a33477071b3777001db4296cbb315477624789133fea0400dd9e8
            • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID:
            • API String ID: 4104443479-0
            • Opcode ID: 5fee0cae0de44a1ce352db1b8d178905c1f101cf2ac7ec6a7b448eaa15158cc5
            • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
            • Opcode Fuzzy Hash: 5fee0cae0de44a1ce352db1b8d178905c1f101cf2ac7ec6a7b448eaa15158cc5
            • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
            • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
            • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
            • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
            • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 00444B34
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _malloc_memmove
            • String ID:
            • API String ID: 1183979061-0
            • Opcode ID: d58fa48e255ee436e37ff8a874cf1cde9b8dc76de314b36fe1ef5a184b0306f2
            • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
            • Opcode Fuzzy Hash: d58fa48e255ee436e37ff8a874cf1cde9b8dc76de314b36fe1ef5a184b0306f2
            • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __lock_file
            • String ID:
            • API String ID: 3031932315-0
            • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
            • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
            • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
            APIs
              • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
              • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
              • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
            • VariantClear.OLEAUT32(?), ref: 0047973E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Clear$CopyInit
            • String ID:
            • API String ID: 24293632-0
            • Opcode ID: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
            • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
            • Opcode Fuzzy Hash: 5d7337fccf444792d50b64af1a389de1ebb3e8953e67bf22bf250c0f7ac223aa
            • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
            • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
            • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 041A7B11
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
            • Instruction ID: a3e8a61b2d1a7487af01f0f637b5cd886e75da95dff4d8748d26628fb4ed1961
            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
            • Instruction Fuzzy Hash: 68E0BF7594110DEFDB00EFB4D9496DE7BB4EF04301F1005A1FD05D7680DB309E648A66
            APIs
            • Sleep.KERNELBASE(000001F4), ref: 041A7B11
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction ID: da2cc7f487e0c433ab3c451967c79064b1057977a8126e317340cddc8a37f09e
            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
            • Instruction Fuzzy Hash: 44E0E67594110DDFDB00EFB4D9496DE7FB4EF04301F100561FD01D2280D7309E608A62
            APIs
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
            • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
            • GetKeyState.USER32(00000011), ref: 0047C92D
            • GetKeyState.USER32(00000009), ref: 0047C936
            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
            • GetKeyState.USER32(00000010), ref: 0047C953
            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
            • _wcsncpy.LIBCMT ref: 0047CA29
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
            • SendMessageW.USER32 ref: 0047CA7F
            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
            • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
            • ImageList_SetDragCursorImage.COMCTL32(00B71020,00000000,00000000,00000000), ref: 0047CB9B
            • ImageList_BeginDrag.COMCTL32(00B71020,00000000,000000F8,000000F0), ref: 0047CBAC
            • SetCapture.USER32(?), ref: 0047CBB6
            • ClientToScreen.USER32(?,?), ref: 0047CC17
            • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
            • ReleaseCapture.USER32 ref: 0047CC3A
            • GetCursorPos.USER32(?), ref: 0047CC72
            • ScreenToClient.USER32(?,?), ref: 0047CC80
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
            • SendMessageW.USER32 ref: 0047CD12
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
            • SendMessageW.USER32 ref: 0047CD80
            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
            • GetCursorPos.USER32(?), ref: 0047CDC8
            • ScreenToClient.USER32(?,?), ref: 0047CDD6
            • GetParent.USER32(00000000), ref: 0047CDF7
            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
            • SendMessageW.USER32 ref: 0047CE93
            • ClientToScreen.USER32(?,?), ref: 0047CEEE
            • TrackPopupMenuEx.USER32(?,00000000,?,?,00A01AD8,00000000,?,?,?,?), ref: 0047CF1C
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
            • SendMessageW.USER32 ref: 0047CF6B
            • ClientToScreen.USER32(?,?), ref: 0047CFB5
            • TrackPopupMenuEx.USER32(?,00000080,?,?,00A01AD8,00000000,?,?,?,?), ref: 0047CFE6
            • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
            • String ID: @GUI_DRAGID$F
            • API String ID: 3100379633-4164748364
            • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
            • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
            • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
            APIs
            • GetForegroundWindow.USER32 ref: 00434420
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
            • IsIconic.USER32(?), ref: 0043444F
            • ShowWindow.USER32(?,00000009), ref: 0043445C
            • SetForegroundWindow.USER32(?), ref: 0043446A
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
            • GetCurrentThreadId.KERNEL32 ref: 00434485
            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
            • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
            • SetForegroundWindow.USER32(00000000), ref: 004344B7
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
            • keybd_event.USER32(00000012,00000000), ref: 004344CF
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
            • keybd_event.USER32(00000012,00000000), ref: 004344E6
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
            • keybd_event.USER32(00000012,00000000), ref: 004344FD
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
            • keybd_event.USER32(00000012,00000000), ref: 00434514
            • SetForegroundWindow.USER32(00000000), ref: 0043451E
            • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
            • String ID: Shell_TrayWnd
            • API String ID: 2889586943-2988720461
            • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
            • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
            • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
            APIs
            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
            • CloseHandle.KERNEL32(?), ref: 004463A0
            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
            • GetProcessWindowStation.USER32 ref: 004463D1
            • SetProcessWindowStation.USER32(00000000), ref: 004463DB
            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
            • _wcslen.LIBCMT ref: 00446498
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _wcsncpy.LIBCMT ref: 004464C0
            • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
            • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
            • UnloadUserProfile.USERENV(?,?), ref: 00446555
            • CloseWindowStation.USER32(00000000), ref: 0044656C
            • CloseDesktop.USER32(?), ref: 0044657A
            • SetProcessWindowStation.USER32(?), ref: 00446588
            • CloseHandle.KERNEL32(?), ref: 00446592
            • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
            • String ID: $@OH$default$winsta0
            • API String ID: 3324942560-3791954436
            • Opcode ID: 32b69c4791a7470fa0b80647bfdf086b52c1a9ae88e861a394681d1362ebb5d4
            • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
            • Opcode Fuzzy Hash: 32b69c4791a7470fa0b80647bfdf086b52c1a9ae88e861a394681d1362ebb5d4
            • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
            • __wsplitpath.LIBCMT ref: 00403492
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscpy.LIBCMT ref: 004034A7
            • _wcscat.LIBCMT ref: 004034BC
            • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0046E9F6,?,004285F5,?,?,?,004285F5), ref: 00403B08
              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,004285F5,?,?), ref: 00403B41
            • _wcscpy.LIBCMT ref: 004035A0
            • _wcslen.LIBCMT ref: 00403623
            • _wcslen.LIBCMT ref: 0040367D
            Strings
            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
            • _, xrefs: 0040371C
            • Unterminated string, xrefs: 00428348
            • C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, xrefs: 004033D7
            • Error opening the file, xrefs: 00428231
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
            • String ID: #include depth exceeded. Make sure there are no recursive includes$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe$Error opening the file$Unterminated string$_
            • API String ID: 3393021363-744933580
            • Opcode ID: cf3fd145479e3ca9ad18f13eb39260db80811bc81b750e2dbc1ac6e294f41336
            • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
            • Opcode Fuzzy Hash: cf3fd145479e3ca9ad18f13eb39260db80811bc81b750e2dbc1ac6e294f41336
            • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
            • FindClose.KERNEL32(00000000), ref: 00478924
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
            • __swprintf.LIBCMT ref: 004789D3
            • __swprintf.LIBCMT ref: 00478A1D
            • __swprintf.LIBCMT ref: 00478A4B
            • __swprintf.LIBCMT ref: 00478A79
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
            • __swprintf.LIBCMT ref: 00478AA7
            • __swprintf.LIBCMT ref: 00478AD5
            • __swprintf.LIBCMT ref: 00478B03
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
            • API String ID: 999945258-2428617273
            • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
            • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
            • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
            • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
            • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
            • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
            • FindClose.KERNEL32(00000000), ref: 00431B20
            • FindClose.KERNEL32(00000000), ref: 00431B34
            • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
            • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
            • FindClose.KERNEL32(00000000), ref: 00431BCD
            • FindClose.KERNEL32(00000000), ref: 00431BDB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
            • String ID: *.*
            • API String ID: 1409584000-438819550
            • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
            • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
            • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
            APIs
            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
            • __swprintf.LIBCMT ref: 00431C2E
            • _wcslen.LIBCMT ref: 00431C3A
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
            • String ID: :$\$\??\%s
            • API String ID: 2192556992-3457252023
            • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
            • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
            • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
            APIs
            • GetLocalTime.KERNEL32(?), ref: 004722A2
            • __swprintf.LIBCMT ref: 004722B9
            • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
            • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
            • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
            • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
            • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
            • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
            • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
            • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
            • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FolderPath$LocalTime__swprintf
            • String ID: %.3d
            • API String ID: 3337348382-986655627
            • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
            • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
            • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
            APIs
            • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
            • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
            • FindClose.KERNEL32(00000000), ref: 0044291C
            • FindClose.KERNEL32(00000000), ref: 00442930
            • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
            • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
            • FindClose.KERNEL32(00000000), ref: 004429D4
              • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
            • FindClose.KERNEL32(00000000), ref: 004429E2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
            • String ID: *.*
            • API String ID: 2640511053-438819550
            • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
            • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
            • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
            APIs
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
            • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
            • GetLastError.KERNEL32 ref: 00433414
            • ExitWindowsEx.USER32(?,00000000), ref: 00433437
            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 2938487562-3733053543
            • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
            • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
            • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
            APIs
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
              • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
              • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
            • GetLengthSid.ADVAPI32(?), ref: 004461D0
            • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
            • GetLengthSid.ADVAPI32(?), ref: 00446241
            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
            • CopySid.ADVAPI32(00000000), ref: 00446271
            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
            • String ID:
            • API String ID: 1255039815-0
            • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
            • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
            • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
            APIs
            • __swprintf.LIBCMT ref: 00433073
            • __swprintf.LIBCMT ref: 00433085
            • __wcsicoll.LIBCMT ref: 00433092
            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
            • LoadResource.KERNEL32(?,00000000), ref: 004330BD
            • LockResource.KERNEL32(00000000), ref: 004330CA
            • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
            • LoadResource.KERNEL32(?,00000000), ref: 00433105
            • SizeofResource.KERNEL32(?,00000000), ref: 00433114
            • LockResource.KERNEL32(?), ref: 00433120
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
            • String ID:
            • API String ID: 1158019794-0
            • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
            • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
            • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
            • String ID:
            • API String ID: 1737998785-0
            • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
            • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
            • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D627
            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
            • GetLastError.KERNEL32 ref: 0045D6BF
            • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Error$Mode$DiskFreeLastSpace
            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
            • API String ID: 4194297153-14809454
            • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
            • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
            • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove$_strncmp
            • String ID: @oH$\$^$h
            • API String ID: 2175499884-3701065813
            • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
            • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
            • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
            • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
            APIs
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
            • bind.WSOCK32(00000000,?,00000010), ref: 00465356
            • WSAGetLastError.WSOCK32(00000000), ref: 00465363
            • closesocket.WSOCK32(00000000,00000000), ref: 00465377
            • listen.WSOCK32(00000000,00000005), ref: 00465381
            • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
            • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLast$closesocket$bindlistensocket
            • String ID:
            • API String ID: 540024437-0
            • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
            • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
            • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: ERCP$VUUU$VUUU$VUUU$XjH
            • API String ID: 0-2872873767
            • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
            • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
            • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
            APIs
            • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
            • __wsplitpath.LIBCMT ref: 00475644
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • _wcscat.LIBCMT ref: 00475657
            • __wcsicoll.LIBCMT ref: 0047567B
            • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
            • CloseHandle.KERNEL32(00000000), ref: 004756BA
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
            • String ID:
            • API String ID: 2547909840-0
            • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
            • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
            • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
            • Sleep.KERNEL32(0000000A), ref: 0045250B
            • FindNextFileW.KERNEL32(?,?), ref: 004525E9
            • FindClose.KERNEL32(?), ref: 004525FF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
            • String ID: *.*$\VH
            • API String ID: 2786137511-2657498754
            • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
            • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
            • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
            APIs
            • IsDebuggerPresent.KERNEL32 ref: 00421FC1
            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
            • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
            • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
            • TerminateProcess.KERNEL32(00000000), ref: 00422004
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
            • String ID: pqI
            • API String ID: 2579439406-2459173057
            • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
            • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
            • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
            APIs
            • __wcsicoll.LIBCMT ref: 00433349
            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
            • __wcsicoll.LIBCMT ref: 00433375
            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicollmouse_event
            • String ID: DOWN
            • API String ID: 1033544147-711622031
            • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
            • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
            • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C3D2
            • SetKeyboardState.USER32(00000080), ref: 0044C3F6
            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: KeyboardMessagePostState$InputSend
            • String ID:
            • API String ID: 3031425849-0
            • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
            • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
            • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
            • WSAGetLastError.WSOCK32(00000000), ref: 00476692
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLastinet_addrsocket
            • String ID:
            • API String ID: 4170576061-0
            • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
            • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
            • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • IsWindowVisible.USER32 ref: 0047A368
            • IsWindowEnabled.USER32 ref: 0047A378
            • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
            • IsIconic.USER32 ref: 0047A393
            • IsZoomed.USER32 ref: 0047A3A1
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$EnabledForegroundIconicVisibleZoomed
            • String ID:
            • API String ID: 292994002-0
            • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
            • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
            • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
            • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
            • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: U$\
            • API String ID: 4104443479-100911408
            • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
            • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
            • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
            APIs
            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Find$File$CloseFirstNext
            • String ID:
            • API String ID: 3541575487-0
            • Opcode ID: 8ec4b7a3981feef6b7ee127dd1057797315d3288f824c92c24242a8404effa4d
            • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
            • Opcode Fuzzy Hash: 8ec4b7a3981feef6b7ee127dd1057797315d3288f824c92c24242a8404effa4d
            • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
            APIs
            • GetFileAttributesW.KERNEL32(?,?), ref: 004339C7
            • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
            • FindClose.KERNEL32(00000000), ref: 004339EB
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FileFind$AttributesCloseFirst
            • String ID:
            • API String ID: 48322524-0
            • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
            • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
            • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
            APIs
            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
            • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Internet$AvailableDataErrorFileLastQueryRead
            • String ID:
            • API String ID: 901099227-0
            • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
            • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
            • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
            • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
            APIs
            • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Proc
            • String ID:
            • API String ID: 2346855178-0
            • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
            • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
            • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
            APIs
            • BlockInput.USER32(00000001), ref: 0045A38B
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: BlockInput
            • String ID:
            • API String ID: 3456056419-0
            • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
            • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
            • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
            APIs
            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: LogonUser
            • String ID:
            • API String ID: 1244722697-0
            • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
            • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
            • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
            APIs
            • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: NameUser
            • String ID:
            • API String ID: 2645101109-0
            • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
            • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
            • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
            • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
            • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: N@
            • API String ID: 0-1509896676
            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
            • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
            • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
            • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: e2fdcc808cd8c46d6bdfc3dcc25c4d1db7a360df7de3bd26c5ce708bb4887c42
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: D941A271D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB90
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction ID: 27dfa4bf5171decf8f5a3a75b4c7108124c629f53d4b892cceda175d0cd5d7ed
            • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
            • Instruction Fuzzy Hash: BD41A471D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB90
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: 6eae88b4ad400c8cb5f011b29af51d959aac1c84ada9ecd25092525ede2b10d3
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: F801A879A04209EFCB44DF98C5909AEF7F6FF48310F208599D80997301D730AE52DB80
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: 42a36f492883edba91c625d3437525cd174fe38148d1a1fe98329efb15163ce5
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: 60019278A04209EFCB48DF98C5909AEF7F6FB48310F208599E809A7701E730AE51DB90
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction ID: 916bcd9eab526d01d9fea09cdad272fafa3507cd8e3cf51b8a69b8aa67401960
            • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
            • Instruction Fuzzy Hash: 52019278A01109EFCB48EF98C5909AEF7B5FF48310F208599D819A7341E730AE51DB80
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction ID: 70bd2cdecbb78a9adc397a5c6ecf08cb4fe7cae4997505f5a471a5cf08ca1bc4
            • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
            • Instruction Fuzzy Hash: 54019278A11109EFCB48EF98C5909AEF7B5FF48310F208599D909A7701E730AE51DB80
            Memory Dump Source
            • Source File: 00000000.00000002.2123473508.00000000041A5000.00000040.00000020.00020000.00000000.sdmp, Offset: 041A5000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_41a5000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
            • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
            • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
            APIs
            • DeleteObject.GDI32(?), ref: 0045953B
            • DeleteObject.GDI32(?), ref: 00459551
            • DestroyWindow.USER32(?), ref: 00459563
            • GetDesktopWindow.USER32 ref: 00459581
            • GetWindowRect.USER32(00000000), ref: 00459588
            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
            • GetClientRect.USER32(00000000,?), ref: 004596F8
            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
            • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
            • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
            • GlobalLock.KERNEL32(00000000), ref: 0045978F
            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
            • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
            • CloseHandle.KERNEL32(00000000), ref: 004597AC
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
            • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
            • GlobalFree.KERNEL32(00000000), ref: 004597E2
            • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
            • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
            • ShowWindow.USER32(?,00000004), ref: 00459865
            • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
            • GetStockObject.GDI32(00000011), ref: 004598CD
            • SelectObject.GDI32(00000000,00000000), ref: 004598D5
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
            • DeleteDC.GDI32(00000000), ref: 004598F8
            • _wcslen.LIBCMT ref: 00459916
            • _wcscpy.LIBCMT ref: 0045993A
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
            • GetDC.USER32(00000000), ref: 004599FC
            • SelectObject.GDI32(00000000,?), ref: 00459A0C
            • SelectObject.GDI32(00000000,00000007), ref: 00459A37
            • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
            • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
            • String ID: $AutoIt v3$DISPLAY$static
            • API String ID: 4040870279-2373415609
            • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
            • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
            • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
            APIs
            • GetSysColor.USER32(00000012), ref: 0044181E
            • SetTextColor.GDI32(?,?), ref: 00441826
            • GetSysColorBrush.USER32(0000000F), ref: 0044183D
            • GetSysColor.USER32(0000000F), ref: 00441849
            • SetBkColor.GDI32(?,?), ref: 00441864
            • SelectObject.GDI32(?,?), ref: 00441874
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
            • GetSysColor.USER32(00000010), ref: 004418B2
            • CreateSolidBrush.GDI32(00000000), ref: 004418B9
            • FrameRect.USER32(?,?,00000000), ref: 004418CA
            • DeleteObject.GDI32(?), ref: 004418D5
            • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
            • FillRect.USER32(?,?,?), ref: 00441970
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
              • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
              • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
              • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
              • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
              • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
              • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
              • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
              • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
              • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
              • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
              • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
              • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
            • String ID:
            • API String ID: 69173610-0
            • Opcode ID: 2ab26cce066401e69105f7e3b9d145bde90cc24b4a71a4e97715bb04ca8b3d86
            • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
            • Opcode Fuzzy Hash: 2ab26cce066401e69105f7e3b9d145bde90cc24b4a71a4e97715bb04ca8b3d86
            • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
            APIs
            • DestroyWindow.USER32(?), ref: 004590F2
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
            • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
            • GetClientRect.USER32(00000000,?), ref: 0045924E
            • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
            • GetStockObject.GDI32(00000011), ref: 004592AC
            • SelectObject.GDI32(00000000,00000000), ref: 004592B4
            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
            • DeleteDC.GDI32(00000000), ref: 004592D6
            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
            • GetStockObject.GDI32(00000011), ref: 004593D3
            • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
            • API String ID: 2910397461-517079104
            • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
            • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
            • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
            • API String ID: 1038674560-3360698832
            • Opcode ID: 816afd3f7c125ce4813b69a9d95b0e650702ca402eb98ea007f73f4095bf5656
            • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
            • Opcode Fuzzy Hash: 816afd3f7c125ce4813b69a9d95b0e650702ca402eb98ea007f73f4095bf5656
            • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
            APIs
            • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
            • SetCursor.USER32(00000000), ref: 0043075B
            • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
            • SetCursor.USER32(00000000), ref: 00430773
            • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
            • SetCursor.USER32(00000000), ref: 0043078B
            • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
            • SetCursor.USER32(00000000), ref: 004307A3
            • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
            • SetCursor.USER32(00000000), ref: 004307BB
            • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
            • SetCursor.USER32(00000000), ref: 004307D3
            • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
            • SetCursor.USER32(00000000), ref: 004307EB
            • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
            • SetCursor.USER32(00000000), ref: 00430803
            • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
            • SetCursor.USER32(00000000), ref: 0043081B
            • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
            • SetCursor.USER32(00000000), ref: 00430833
            • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
            • SetCursor.USER32(00000000), ref: 0043084B
            • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
            • SetCursor.USER32(00000000), ref: 00430863
            • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
            • SetCursor.USER32(00000000), ref: 0043087B
            • SetCursor.USER32(00000000), ref: 00430887
            • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
            • SetCursor.USER32(00000000), ref: 0043089F
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Cursor$Load
            • String ID:
            • API String ID: 1675784387-0
            • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
            • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
            • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
            APIs
            • GetSysColor.USER32(0000000E), ref: 00430913
            • SetTextColor.GDI32(?,00000000), ref: 0043091B
            • GetSysColor.USER32(00000012), ref: 00430933
            • SetTextColor.GDI32(?,?), ref: 0043093B
            • GetSysColorBrush.USER32(0000000F), ref: 0043094E
            • GetSysColor.USER32(0000000F), ref: 00430959
            • CreateSolidBrush.GDI32(?), ref: 00430962
            • GetSysColor.USER32(00000011), ref: 00430979
            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
            • SelectObject.GDI32(?,00000000), ref: 0043099C
            • SetBkColor.GDI32(?,?), ref: 004309A6
            • SelectObject.GDI32(?,?), ref: 004309B4
            • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
            • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
            • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
            • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
            • DrawFocusRect.USER32(?,?), ref: 00430A91
            • GetSysColor.USER32(00000011), ref: 00430A9F
            • SetTextColor.GDI32(?,00000000), ref: 00430AA7
            • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
            • SelectObject.GDI32(?,?), ref: 00430AD0
            • DeleteObject.GDI32(00000105), ref: 00430ADC
            • SelectObject.GDI32(?,?), ref: 00430AE3
            • DeleteObject.GDI32(?), ref: 00430AE9
            • SetTextColor.GDI32(?,?), ref: 00430AF0
            • SetBkColor.GDI32(?,?), ref: 00430AFB
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
            • String ID:
            • API String ID: 1582027408-0
            • Opcode ID: 33e13a8604b0ac370441ec01772595ef8ba084b0830578ad9c621e61740d3e8b
            • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
            • Opcode Fuzzy Hash: 33e13a8604b0ac370441ec01772595ef8ba084b0830578ad9c621e61740d3e8b
            • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
            APIs
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
            • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CloseConnectCreateRegistry
            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
            • API String ID: 3217815495-966354055
            • Opcode ID: e287e9cdff9e3939f57f3eafa5c7c33de269fa846985cbf758c14027cb1afae3
            • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
            • Opcode Fuzzy Hash: e287e9cdff9e3939f57f3eafa5c7c33de269fa846985cbf758c14027cb1afae3
            • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
            APIs
            • GetCursorPos.USER32(?), ref: 004566AE
            • GetDesktopWindow.USER32 ref: 004566C3
            • GetWindowRect.USER32(00000000), ref: 004566CA
            • GetWindowLongW.USER32(?,000000F0), ref: 00456722
            • GetWindowLongW.USER32(?,000000F0), ref: 00456735
            • DestroyWindow.USER32(?), ref: 00456746
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
            • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
            • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
            • IsWindowVisible.USER32(?), ref: 0045682C
            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
            • GetWindowRect.USER32(?,?), ref: 00456873
            • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
            • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
            • CopyRect.USER32(?,?), ref: 004568BE
            • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
            • String ID: ($,$tooltips_class32
            • API String ID: 225202481-3320066284
            • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
            • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
            • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
            APIs
            • OpenClipboard.USER32(?), ref: 0046DCE7
            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
            • GetClipboardData.USER32(0000000D), ref: 0046DD01
            • CloseClipboard.USER32 ref: 0046DD0D
            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
            • CloseClipboard.USER32 ref: 0046DD41
            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
            • GetClipboardData.USER32(00000001), ref: 0046DD8D
            • CloseClipboard.USER32 ref: 0046DD99
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
            • String ID:
            • API String ID: 15083398-0
            • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
            • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
            • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetWindowRect.USER32(?,?), ref: 00471CF7
            • GetClientRect.USER32(?,?), ref: 00471D05
            • GetSystemMetrics.USER32(00000007), ref: 00471D0D
            • GetSystemMetrics.USER32(00000008), ref: 00471D20
            • GetSystemMetrics.USER32(00000004), ref: 00471D42
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
            • GetSystemMetrics.USER32(00000007), ref: 00471D79
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
            • GetSystemMetrics.USER32(00000008), ref: 00471DAB
            • GetSystemMetrics.USER32(00000004), ref: 00471DCF
            • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
            • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
            • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
            • GetClientRect.USER32(?,?), ref: 00471E8A
            • GetStockObject.GDI32(00000011), ref: 00471EA6
            • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
            • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
            • String ID: @$AutoIt v3 GUI
            • API String ID: 867697134-3359773793
            • Opcode ID: fdbc61900c1aed8a056052732ddde90303c00724007151b56a5ca0b78c61fe6f
            • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
            • Opcode Fuzzy Hash: fdbc61900c1aed8a056052732ddde90303c00724007151b56a5ca0b78c61fe6f
            • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
            • API String ID: 1503153545-1459072770
            • Opcode ID: a7ebd4ac9e723ea675fb6b32263d9edea3ebf33deada9c3ab3fdd4587446856f
            • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
            • Opcode Fuzzy Hash: a7ebd4ac9e723ea675fb6b32263d9edea3ebf33deada9c3ab3fdd4587446856f
            • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll$__wcsnicmp
            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
            • API String ID: 790654849-32604322
            • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
            • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
            • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 32e01dcfee684d0de4b465c0a9c088f7828abbba238f4b11e8495382643bfb3a
            • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
            • Opcode Fuzzy Hash: 32e01dcfee684d0de4b465c0a9c088f7828abbba238f4b11e8495382643bfb3a
            • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window
            • String ID: 0
            • API String ID: 2353593579-4108050209
            • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
            • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
            • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
            APIs
            • GetSysColor.USER32(0000000F), ref: 0044A05E
            • GetClientRect.USER32(?,?), ref: 0044A0D1
            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
            • GetWindowDC.USER32(?), ref: 0044A0F6
            • GetPixel.GDI32(00000000,?,?), ref: 0044A108
            • ReleaseDC.USER32(?,?), ref: 0044A11B
            • GetSysColor.USER32(0000000F), ref: 0044A131
            • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
            • GetSysColor.USER32(0000000F), ref: 0044A14F
            • GetSysColor.USER32(00000005), ref: 0044A15B
            • GetWindowDC.USER32(?), ref: 0044A1BE
            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
            • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
            • ReleaseDC.USER32(?,00000000), ref: 0044A229
            • SetBkColor.GDI32(?,00000000), ref: 0044A24C
            • GetSysColor.USER32(00000008), ref: 0044A265
            • SetTextColor.GDI32(?,00000000), ref: 0044A270
            • SetBkMode.GDI32(?,00000001), ref: 0044A282
            • GetStockObject.GDI32(00000005), ref: 0044A28A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
            • String ID:
            • API String ID: 1744303182-0
            • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
            • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
            • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
            • __mtterm.LIBCMT ref: 00417C34
              • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
              • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
            • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
            • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
            • __init_pointers.LIBCMT ref: 00417CE6
            • __calloc_crt.LIBCMT ref: 00417D54
            • GetCurrentThreadId.KERNEL32 ref: 00417D80
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
            • API String ID: 4163708885-3819984048
            • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
            • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
            • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: >>>AUTOIT SCRIPT<<<$\
            • API String ID: 0-1896584978
            • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
            • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
            • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
            • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll$IconLoad
            • String ID: blank$info$question$stop$warning
            • API String ID: 2485277191-404129466
            • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
            • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
            • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
            APIs
            • LoadIconW.USER32(?,00000063), ref: 0045464C
            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
            • SetWindowTextW.USER32(?,?), ref: 00454678
            • GetDlgItem.USER32(?,000003EA), ref: 00454690
            • SetWindowTextW.USER32(00000000,?), ref: 00454697
            • GetDlgItem.USER32(?,000003E9), ref: 004546A8
            • SetWindowTextW.USER32(00000000,?), ref: 004546AF
            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
            • GetWindowRect.USER32(?,?), ref: 004546F5
            • SetWindowTextW.USER32(?,?), ref: 00454765
            • GetDesktopWindow.USER32 ref: 0045476F
            • GetWindowRect.USER32(00000000), ref: 00454776
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
            • GetClientRect.USER32(?,?), ref: 004547D2
            • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
            • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
            • String ID:
            • API String ID: 3869813825-0
            • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
            • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
            • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
            APIs
            • _wcslen.LIBCMT ref: 00464B28
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
            • _wcslen.LIBCMT ref: 00464C28
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
            • _wcslen.LIBCMT ref: 00464CBA
            • _wcslen.LIBCMT ref: 00464CD0
            • _wcslen.LIBCMT ref: 00464CEF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$Directory$CurrentSystem
            • String ID: D
            • API String ID: 1914653954-2746444292
            • Opcode ID: 370002b9ce27089f4eef68b2553d26bfbf6da2b0c815b21cf4c0f3028eedf431
            • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
            • Opcode Fuzzy Hash: 370002b9ce27089f4eef68b2553d26bfbf6da2b0c815b21cf4c0f3028eedf431
            • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
            APIs
            • _wcsncpy.LIBCMT ref: 0045CE39
            • __wsplitpath.LIBCMT ref: 0045CE78
            • _wcscat.LIBCMT ref: 0045CE8B
            • _wcscat.LIBCMT ref: 0045CE9E
            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
            • _wcscpy.LIBCMT ref: 0045CF61
            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
            • String ID: *.*
            • API String ID: 1153243558-438819550
            • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
            • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
            • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll
            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
            • API String ID: 3832890014-4202584635
            • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
            • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
            • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
            APIs
            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
            • GetFocus.USER32 ref: 0046A0DD
            • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessagePost$CtrlFocus
            • String ID: 0
            • API String ID: 1534620443-4108050209
            • Opcode ID: 19fc4ca06a55c5ef94493fcc7b8246f99668ff01b4712dff56d0fdc7fbc3c8ab
            • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
            • Opcode Fuzzy Hash: 19fc4ca06a55c5ef94493fcc7b8246f99668ff01b4712dff56d0fdc7fbc3c8ab
            • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
            APIs
            • DestroyWindow.USER32(?), ref: 004558E3
            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$CreateDestroy
            • String ID: ,$tooltips_class32
            • API String ID: 1109047481-3856767331
            • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
            • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
            • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
            APIs
            • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
            • GetMenuItemCount.USER32(?), ref: 00468C45
            • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
            • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
            • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
            • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
            • GetMenuItemCount.USER32 ref: 00468CFD
            • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
            • GetCursorPos.USER32(?), ref: 00468D3F
            • SetForegroundWindow.USER32(?), ref: 00468D49
            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
            • String ID: 0
            • API String ID: 1441871840-4108050209
            • Opcode ID: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
            • Opcode Fuzzy Hash: 12c28d3332ad221b92e3a636ba418a85e822d4b5186b1920d2f56c44304fb3db
            • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
            • API String ID: 3631882475-2268648507
            • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
            • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
            • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
            APIs
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
            • SendMessageW.USER32 ref: 00471740
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
            • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
            • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
            • SendMessageW.USER32 ref: 0047184F
            • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 4116747274-0
            • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
            • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
            • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
            • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: InfoItemMenu$Sleep
            • String ID: 0
            • API String ID: 1196289194-4108050209
            • Opcode ID: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
            • Opcode Fuzzy Hash: c65cffcb0b41bccfc2e749f507a7067f69681543840726e93d819a57ffaed043
            • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
            APIs
            • GetDC.USER32(00000000), ref: 0043143E
            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
            • CreateCompatibleDC.GDI32(00000000), ref: 00431459
            • SelectObject.GDI32(00000000,?), ref: 00431466
            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
            • String ID: (
            • API String ID: 3300687185-3887548279
            • Opcode ID: 1fe97bc8bf9d8eaeb3297d274ead1acc1ba6092dc26e665571dd5f65587823ec
            • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
            • Opcode Fuzzy Hash: 1fe97bc8bf9d8eaeb3297d274ead1acc1ba6092dc26e665571dd5f65587823ec
            • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32 ref: 0045DB32
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
            • API String ID: 1976180769-4113822522
            • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
            • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
            • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$_wcsncpy$LocalTime__fassign
            • String ID:
            • API String ID: 461458858-0
            • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
            • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
            • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
            APIs
            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
            • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
            • GlobalLock.KERNEL32(00000000), ref: 004300F6
            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
            • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
            • CloseHandle.KERNEL32(00000000), ref: 00430113
            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
            • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
            • GlobalFree.KERNEL32(00000000), ref: 00430150
            • GetObjectW.GDI32(?,00000018,?), ref: 00430177
            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
            • DeleteObject.GDI32(?), ref: 004301D0
            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
            • String ID:
            • API String ID: 3969911579-0
            • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
            • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
            • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
            • String ID: 0
            • API String ID: 956284711-4108050209
            • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
            • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
            • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
            • String ID: 0.0.0.0
            • API String ID: 1965227024-3771769585
            • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
            • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
            • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
            • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: SendString$_memmove_wcslen
            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
            • API String ID: 369157077-1007645807
            • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
            • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
            • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
            APIs
            • GetParent.USER32 ref: 00445BF8
            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
            • __wcsicoll.LIBCMT ref: 00445C33
            • __wcsicoll.LIBCMT ref: 00445C4F
            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll$ClassMessageNameParentSend
            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
            • API String ID: 3125838495-3381328864
            • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
            • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
            • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
            APIs
            • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
            • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
            • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
            • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
            • SendMessageW.USER32(?,00000402,?), ref: 00449399
            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$CharNext
            • String ID:
            • API String ID: 1350042424-0
            • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
            • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
            • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
            APIs
              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
            • GetDriveTypeW.KERNEL32(?), ref: 004787B9
            • _wcscpy.LIBCMT ref: 004787E5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
            • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
            • API String ID: 3052893215-2127371420
            • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
            • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
            • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
            • __swprintf.LIBCMT ref: 0045E7F7
            • _wprintf.LIBCMT ref: 0045E8B3
            • _wprintf.LIBCMT ref: 0045E8D7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-2354261254
            • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
            • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
            • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __swprintf_wcscpy$__i64tow__itow
            • String ID: %.15g$0x%p$False$True
            • API String ID: 3038501623-2263619337
            • Opcode ID: d54577a322ce46acdd7896bc048e3a377bffedb73e485ef38317cb10756158f6
            • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
            • Opcode Fuzzy Hash: d54577a322ce46acdd7896bc048e3a377bffedb73e485ef38317cb10756158f6
            • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
            APIs
            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
            • __swprintf.LIBCMT ref: 0045E5F6
            • _wprintf.LIBCMT ref: 0045E6A3
            • _wprintf.LIBCMT ref: 0045E6C7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
            • API String ID: 2295938435-8599901
            • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
            • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
            • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
            APIs
            • timeGetTime.WINMM ref: 00443B67
              • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
            • Sleep.KERNEL32(0000000A), ref: 00443B9F
            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
            • SetActiveWindow.USER32(00000000), ref: 00443BEC
            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
            • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
            • Sleep.KERNEL32(000000FA), ref: 00443C2D
            • IsWindow.USER32(00000000), ref: 00443C3A
            • EndDialog.USER32(00000000,00000000), ref: 00443C4C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
            • String ID: BUTTON
            • API String ID: 1834419854-3405671355
            • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
            • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
            • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
            APIs
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
            • LoadStringW.USER32(00000000), ref: 00454040
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • _wprintf.LIBCMT ref: 00454074
            • __swprintf.LIBCMT ref: 004540A3
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
            • API String ID: 455036304-4153970271
            • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
            • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
            • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
            APIs
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
            • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
            • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
            • _memmove.LIBCMT ref: 00467EB8
            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
            • _memmove.LIBCMT ref: 00467F6C
            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
            • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
            • String ID:
            • API String ID: 2170234536-0
            • Opcode ID: 3d86a1b5ea0e599cd8b6d68b8f59e2f86878088e6b6264a2abca6a2ed6f74cd8
            • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
            • Opcode Fuzzy Hash: 3d86a1b5ea0e599cd8b6d68b8f59e2f86878088e6b6264a2abca6a2ed6f74cd8
            • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
            APIs
            • GetKeyboardState.USER32(?), ref: 00453CE0
            • SetKeyboardState.USER32(?), ref: 00453D3B
            • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
            • GetKeyState.USER32(000000A0), ref: 00453D75
            • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
            • GetKeyState.USER32(000000A1), ref: 00453DB5
            • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
            • GetKeyState.USER32(00000011), ref: 00453DEF
            • GetAsyncKeyState.USER32(00000012), ref: 00453E18
            • GetKeyState.USER32(00000012), ref: 00453E26
            • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
            • GetKeyState.USER32(0000005B), ref: 00453E5D
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
            • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
            • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
            APIs
            • GetDlgItem.USER32(?,00000001), ref: 004357DB
            • GetWindowRect.USER32(00000000,?), ref: 004357ED
            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
            • GetDlgItem.USER32(?,00000002), ref: 0043586A
            • GetWindowRect.USER32(00000000,?), ref: 0043587C
            • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
            • GetDlgItem.USER32(?,000003E9), ref: 004358DC
            • GetWindowRect.USER32(00000000,?), ref: 004358EE
            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
            • GetDlgItem.USER32(?,000003EA), ref: 00435941
            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
            • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$ItemMoveRect$Invalidate
            • String ID:
            • API String ID: 3096461208-0
            • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
            • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
            • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
            APIs
            • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
            • DeleteObject.GDI32(?), ref: 0047151E
            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
            • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
            • DeleteObject.GDI32(?), ref: 004715EA
            • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
            • String ID:
            • API String ID: 3218148540-0
            • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
            • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
            • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
            • String ID:
            • API String ID: 136442275-0
            • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
            • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
            • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
            APIs
            • _wcsncpy.LIBCMT ref: 00467490
            • _wcsncpy.LIBCMT ref: 004674BC
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcstok.LIBCMT ref: 004674FF
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcstok.LIBCMT ref: 004675B2
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcscpy.LIBCMT ref: 00467641
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcslen.LIBCMT ref: 004677BD
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
            • String ID: X
            • API String ID: 3104067586-3081909835
            • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
            • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
            • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
            • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
            APIs
            • GetClassNameW.USER32(?,?,00000400), ref: 00461056
            • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
            • _wcslen.LIBCMT ref: 004610A3
            • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
            • GetClassNameW.USER32(?,?,00000400), ref: 00461124
            • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
            • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
            • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
            • GetWindowRect.USER32(?,?), ref: 00461248
              • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
            • String ID: ThumbnailClass
            • API String ID: 4136854206-1241985126
            • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
            • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
            • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
            • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
            • GetClientRect.USER32(?,?), ref: 00471A1A
            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
            • DestroyIcon.USER32(?), ref: 00471AF4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
            • String ID: 2
            • API String ID: 1331449709-450215437
            • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
            • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
            • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
            APIs
            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
            • __swprintf.LIBCMT ref: 00460915
            • __swprintf.LIBCMT ref: 0046092D
            • _wprintf.LIBCMT ref: 004609E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
            • API String ID: 3054410614-2561132961
            • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
            • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
            • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
            • CLSIDFromString.OLE32(?,?), ref: 004587B3
            • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
            • RegCloseKey.ADVAPI32(?), ref: 004587C5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
            • API String ID: 600699880-22481851
            • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
            • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
            • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: static
            • API String ID: 3375834691-2160076837
            • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
            • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
            • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D959
            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$DriveType
            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
            • API String ID: 2907320926-3566645568
            • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
            • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
            • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyAcceleratorTable.USER32(?), ref: 0047094A
            • ImageList_Destroy.COMCTL32(?), ref: 004709AD
            • ImageList_Destroy.COMCTL32(?), ref: 004709C5
            • ImageList_Destroy.COMCTL32(?), ref: 004709D5
            • DeleteObject.GDI32(005C0000), ref: 00470A04
            • DestroyIcon.USER32(00690057), ref: 00470A1C
            • DeleteObject.GDI32(42E71416), ref: 00470A34
            • DestroyWindow.USER32(00740073), ref: 00470A4C
            • DestroyIcon.USER32(?), ref: 00470A73
            • DestroyIcon.USER32(?), ref: 00470A81
            • KillTimer.USER32(00000000,00000000), ref: 00470B00
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
            • String ID:
            • API String ID: 1237572874-0
            • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
            • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
            • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
            APIs
            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
            • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
            • VariantInit.OLEAUT32(?), ref: 004793E1
            • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
            • VariantCopy.OLEAUT32(?,?), ref: 00479461
            • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
            • VariantClear.OLEAUT32(?), ref: 00479489
            • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
            • VariantClear.OLEAUT32(?), ref: 004794CA
            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
            • String ID:
            • API String ID: 2706829360-0
            • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
            • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
            • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
            APIs
            • GetKeyboardState.USER32(?), ref: 0044480E
            • GetAsyncKeyState.USER32(000000A0), ref: 00444899
            • GetKeyState.USER32(000000A0), ref: 004448AA
            • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
            • GetKeyState.USER32(000000A1), ref: 004448D9
            • GetAsyncKeyState.USER32(00000011), ref: 004448F5
            • GetKeyState.USER32(00000011), ref: 00444903
            • GetAsyncKeyState.USER32(00000012), ref: 0044491F
            • GetKeyState.USER32(00000012), ref: 0044492D
            • GetAsyncKeyState.USER32(0000005B), ref: 00444949
            • GetKeyState.USER32(0000005B), ref: 00444958
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: State$Async$Keyboard
            • String ID:
            • API String ID: 541375521-0
            • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
            • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
            • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: InitVariant$_malloc_wcscpy_wcslen
            • String ID:
            • API String ID: 3413494760-0
            • Opcode ID: e94a351051a0650a6d145f307f0eea7b662f646848f9bee82b656bed35363f0e
            • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
            • Opcode Fuzzy Hash: e94a351051a0650a6d145f307f0eea7b662f646848f9bee82b656bed35363f0e
            • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressProc_free_malloc$_strcat_strlen
            • String ID: AU3_FreeVar
            • API String ID: 2634073740-771828931
            • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
            • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
            • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
            • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
            APIs
            • CoInitialize.OLE32 ref: 0046C63A
            • CoUninitialize.OLE32 ref: 0046C645
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
              • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
            • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
            • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
            • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
            • IIDFromString.OLE32(?,?), ref: 0046C705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
            • API String ID: 2294789929-1287834457
            • Opcode ID: 0198b108f76d52af3bbd9fee550614c588b241b933c9d0f3746922e50da14242
            • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
            • Opcode Fuzzy Hash: 0198b108f76d52af3bbd9fee550614c588b241b933c9d0f3746922e50da14242
            • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
            APIs
              • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
              • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
            • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
            • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
            • ImageList_EndDrag.COMCTL32 ref: 00471169
            • ReleaseCapture.USER32 ref: 0047116F
            • SetWindowTextW.USER32(?,00000000), ref: 00471206
            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
            • String ID: @GUI_DRAGFILE$@GUI_DROPID
            • API String ID: 2483343779-2107944366
            • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
            • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
            • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
            • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
            APIs
            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
            • _wcslen.LIBCMT ref: 00450720
            • _wcscat.LIBCMT ref: 00450733
            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
            • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$Window_wcscat_wcslen
            • String ID: -----$SysListView32
            • API String ID: 4008455318-3975388722
            • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
            • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
            • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
            • GetDlgCtrlID.USER32(00000000), ref: 00469C84
            • GetParent.USER32 ref: 00469C98
            • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
            • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
            • GetParent.USER32 ref: 00469CBC
            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$CtrlParent$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 2360848162-1403004172
            • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
            • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
            • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
            • String ID:
            • API String ID: 262282135-0
            • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
            • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
            • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
            APIs
            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
            • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
            • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
            • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
            • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
            APIs
              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
            • SendMessageW.USER32(75A923D0,00001001,00000000,?), ref: 00448E16
            • SendMessageW.USER32(75A923D0,00001026,00000000,?), ref: 00448E25
              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$BrushCreateDeleteObjectSolid
            • String ID:
            • API String ID: 3771399671-0
            • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
            • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
            • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00434643
            • GetForegroundWindow.USER32(00000000), ref: 00434655
            • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
            • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
            • String ID:
            • API String ID: 2156557900-0
            • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
            • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
            • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
            • API String ID: 0-1603158881
            • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
            • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
            • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
            APIs
            • CreateMenu.USER32 ref: 00448603
            • SetMenu.USER32(?,00000000), ref: 00448613
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
            • IsMenu.USER32(?), ref: 004486AB
            • CreatePopupMenu.USER32 ref: 004486B5
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
            • DrawMenuBar.USER32 ref: 004486F5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$CreateItem$DrawInfoInsertPopup
            • String ID: 0
            • API String ID: 161812096-4108050209
            • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
            • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
            • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
            APIs
            • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe), ref: 00434057
            • LoadStringW.USER32(00000000), ref: 00434060
            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
            • LoadStringW.USER32(00000000), ref: 00434078
            • _wprintf.LIBCMT ref: 004340A1
            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
            Strings
            • C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, xrefs: 00434040
            • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: HandleLoadModuleString$Message_wprintf
            • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
            • API String ID: 3648134473-1671770069
            • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
            • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
            • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0a0629d9aa1b0ed03fb36deb9e9c582e4b4eb92644ec6590898caa0a9a7eb738
            • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
            • Opcode Fuzzy Hash: 0a0629d9aa1b0ed03fb36deb9e9c582e4b4eb92644ec6590898caa0a9a7eb738
            • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
            • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
            • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
            • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,0040F545,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,004A90E8,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,?,0040F545), ref: 0041013C
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • lstrcmpiW.KERNEL32(?,?), ref: 00453900
            • MoveFileW.KERNEL32(?,?), ref: 00453932
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: File$AttributesFullMoveNamePathlstrcmpi
            • String ID:
            • API String ID: 978794511-0
            • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
            • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
            • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
            • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
            • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ClearVariant
            • String ID:
            • API String ID: 1473721057-0
            • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
            • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
            • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove$_memcmp
            • String ID: '$\$h
            • API String ID: 2205784470-1303700344
            • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
            • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
            • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
            APIs
            • VariantInit.OLEAUT32(00000000), ref: 0045EA56
            • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
            • VariantClear.OLEAUT32 ref: 0045EA6D
            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
            • __swprintf.LIBCMT ref: 0045EC33
            • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
            Strings
            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$InitTime$ClearCopySystem__swprintf
            • String ID: %4d%02d%02d%02d%02d%02d
            • API String ID: 2441338619-1568723262
            • Opcode ID: 6ca95a049206163b32e68f36113e27bccbd1f3714250f3b34fae7ab63deb30de
            • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
            • Opcode Fuzzy Hash: 6ca95a049206163b32e68f36113e27bccbd1f3714250f3b34fae7ab63deb30de
            • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
            • Sleep.KERNEL32(0000000A), ref: 0042C67F
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID: @COM_EVENTOBJ
            • API String ID: 327565842-2228938565
            • Opcode ID: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
            • Opcode Fuzzy Hash: ca0223daa9e96e83c575322b086aef175ea6f60956e985fc72e5b4b432ff0b62
            • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
            APIs
            • VariantClear.OLEAUT32(?), ref: 0047031B
            • VariantClear.OLEAUT32(?), ref: 0047044F
            • VariantInit.OLEAUT32(?), ref: 004704A3
            • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
            • VariantClear.OLEAUT32(?), ref: 00470516
              • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
            • VariantCopy.OLEAUT32(?,?), ref: 0047057A
              • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
            • VariantClear.OLEAUT32(00000000), ref: 0047060D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Clear$Copy$CallDispFuncInit
            • String ID: H
            • API String ID: 3613100350-2852464175
            • Opcode ID: aa9467e27181fdc89fa46768d9422833aaa0bae76b69810f9e513e9cb6b95459
            • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
            • Opcode Fuzzy Hash: aa9467e27181fdc89fa46768d9422833aaa0bae76b69810f9e513e9cb6b95459
            • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
            APIs
            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
            • DestroyWindow.USER32(?), ref: 00426F50
            • UnregisterHotKey.USER32(?), ref: 00426F77
            • FreeLibrary.KERNEL32(?), ref: 0042701F
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
            • String ID: close all
            • API String ID: 4174999648-3243417748
            • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
            • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
            • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
            • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
            APIs
            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
            • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
            • String ID:
            • API String ID: 1291720006-3916222277
            • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
            • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
            • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
            APIs
            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
            • IsMenu.USER32(?), ref: 0045FC5F
            • CreatePopupMenu.USER32 ref: 0045FC97
            • GetMenuItemCount.USER32(?), ref: 0045FCFD
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$Item$CountCreateInfoInsertPopup
            • String ID: 0$2
            • API String ID: 93392585-3793063076
            • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
            • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
            • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
            APIs
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
            • VariantClear.OLEAUT32(?), ref: 00435320
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
            • VariantClear.OLEAUT32(?), ref: 004353B3
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
            • String ID: crts
            • API String ID: 586820018-3724388283
            • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
            • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
            • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
            APIs
              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,0040F545,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,004A90E8,C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe,?,0040F545), ref: 0041013C
            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
            • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
            • _wcscat.LIBCMT ref: 0044BCAF
            • _wcslen.LIBCMT ref: 0044BCBB
            • _wcslen.LIBCMT ref: 0044BCD1
            • SHFileOperationW.SHELL32(?), ref: 0044BD17
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
            • String ID: \*.*
            • API String ID: 2326526234-1173974218
            • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
            • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
            • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
            APIs
              • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
            • _wcslen.LIBCMT ref: 004335F2
            • GetFileAttributesW.KERNEL32(?), ref: 0043361C
            • GetLastError.KERNEL32 ref: 0043362B
            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
            • _wcsrchr.LIBCMT ref: 00433666
              • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
            • String ID: \
            • API String ID: 321622961-2967466578
            • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
            • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
            • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
            • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsnicmp
            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
            • API String ID: 1038674560-2734436370
            • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
            • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
            • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
            • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
            APIs
            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
            • __lock.LIBCMT ref: 00417981
              • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
              • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
              • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
            • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
            • __lock.LIBCMT ref: 004179A2
            • ___addlocaleref.LIBCMT ref: 004179C0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
            • String ID: KERNEL32.DLL$pI
            • API String ID: 637971194-197072765
            • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
            • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
            • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove$_malloc
            • String ID:
            • API String ID: 1938898002-0
            • Opcode ID: c9a42082bca8330c56f828d9adfbb0377cc92045948a33791cb660041a32ecb3
            • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
            • Opcode Fuzzy Hash: c9a42082bca8330c56f828d9adfbb0377cc92045948a33791cb660041a32ecb3
            • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
            APIs
            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
            • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
            • _memmove.LIBCMT ref: 0044B555
            • _memmove.LIBCMT ref: 0044B578
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
            • String ID:
            • API String ID: 2737351978-0
            • Opcode ID: fcc1d6224d2d35c5b37cfd826e3d94515231d3e7ed15f75706f3704b0972b142
            • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
            • Opcode Fuzzy Hash: fcc1d6224d2d35c5b37cfd826e3d94515231d3e7ed15f75706f3704b0972b142
            • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 0041523A
            • __calloc_crt.LIBCMT ref: 00415246
            • __getptd.LIBCMT ref: 00415253
            • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
            • _free.LIBCMT ref: 0041529E
            • __dosmaperr.LIBCMT ref: 004152A9
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 3638380555-0
            • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
            • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
            • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
            APIs
            • VariantInit.OLEAUT32(?), ref: 0046C96E
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Copy$ClearErrorInitLast
            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
            • API String ID: 3207048006-625585964
            • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
            • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
            • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
            APIs
            • WSAStartup.WSOCK32(00000101,?), ref: 00465559
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
            • gethostbyname.WSOCK32(?), ref: 004655A6
            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
            • _memmove.LIBCMT ref: 004656CA
            • GlobalFree.KERNEL32(00000000), ref: 0046575C
            • WSACleanup.WSOCK32 ref: 00465762
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
            • String ID:
            • API String ID: 2945290962-0
            • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
            • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
            • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
            APIs
            • GetSystemMetrics.USER32(0000000F), ref: 00440527
            • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
            • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
            • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
            • String ID:
            • API String ID: 1457242333-0
            • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
            • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
            • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
            • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
            • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            • _wcstok.LIBCMT ref: 004675B2
              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
            • _wcscpy.LIBCMT ref: 00467641
            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
            • _wcslen.LIBCMT ref: 00467793
            • _wcslen.LIBCMT ref: 004677BD
              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
            • String ID: X
            • API String ID: 780548581-3081909835
            • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
            • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
            • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
            • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
            • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
            • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
            • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
            • CloseFigure.GDI32(?), ref: 0044751F
            • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
            • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
            • String ID:
            • API String ID: 4082120231-0
            • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
            • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
            • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
            • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
            • RegCloseKey.ADVAPI32(?), ref: 0046B49D
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
            • String ID:
            • API String ID: 2027346449-0
            • Opcode ID: e34509464942c339a97cd4dbca514092f8d2b70c3cdfc94ef9c95b79185a061f
            • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
            • Opcode Fuzzy Hash: e34509464942c339a97cd4dbca514092f8d2b70c3cdfc94ef9c95b79185a061f
            • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetMenu.USER32 ref: 0047A703
            • GetMenuItemCount.USER32(00000000), ref: 0047A74F
            • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
            • _wcslen.LIBCMT ref: 0047A79E
            • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
            • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
            • String ID:
            • API String ID: 3257027151-0
            • Opcode ID: 4cce8c15dc1de934e3ee188264f8b3afc076397940d8cd24141180af461316c6
            • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
            • Opcode Fuzzy Hash: 4cce8c15dc1de934e3ee188264f8b3afc076397940d8cd24141180af461316c6
            • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLastselect
            • String ID:
            • API String ID: 215497628-0
            • Opcode ID: 56723facf433c3c8ff31edc338edb1e9341c45390fc1ded105fb915aba0924ee
            • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
            • Opcode Fuzzy Hash: 56723facf433c3c8ff31edc338edb1e9341c45390fc1ded105fb915aba0924ee
            • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
            APIs
            • GetParent.USER32(?), ref: 0044443B
            • GetKeyboardState.USER32(?), ref: 00444450
            • SetKeyboardState.USER32(?), ref: 004444A4
            • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
            • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
            • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
            • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
            APIs
            • GetParent.USER32(?), ref: 00444633
            • GetKeyboardState.USER32(?), ref: 00444648
            • SetKeyboardState.USER32(?), ref: 0044469C
            • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
            • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$Parent
            • String ID:
            • API String ID: 87235514-0
            • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
            • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
            • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
            APIs
            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
            • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
            • String ID:
            • API String ID: 2354583917-0
            • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
            • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
            • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
            • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
            • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
            APIs
            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageMoveSend
            • String ID:
            • API String ID: 896007046-0
            • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
            • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
            • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
            APIs
            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
            • GetFocus.USER32 ref: 00448ACF
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Enable$Show$FocusMessageSend
            • String ID:
            • API String ID: 3429747543-0
            • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
            • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
            • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D459
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
            • __swprintf.LIBCMT ref: 0045D4E9
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume__swprintf
            • String ID: %lu$\VH
            • API String ID: 3164766367-2432546070
            • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
            • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
            • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
            APIs
            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Msctls_Progress32
            • API String ID: 3850602802-3636473452
            • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
            • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
            • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
            APIs
            • _malloc.LIBCMT ref: 0041F707
              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
            • _free.LIBCMT ref: 0041F71A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AllocateHeap_free_malloc
            • String ID: [B
            • API String ID: 1020059152-632041663
            • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
            • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
            • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413DA4
            • __calloc_crt.LIBCMT ref: 00413DB0
            • __getptd.LIBCMT ref: 00413DBD
            • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
            • _free.LIBCMT ref: 00413E07
            • __dosmaperr.LIBCMT ref: 00413E12
              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
            • String ID:
            • API String ID: 155776804-0
            • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
            • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
            • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
            APIs
              • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
              • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
            • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
            • String ID:
            • API String ID: 1957940570-0
            • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
            • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
            • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 259663610-0
            • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
            • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
            • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
            APIs
            • GetClientRect.USER32(?,?), ref: 004302E6
            • GetWindowRect.USER32(00000000,?), ref: 00430316
            • GetClientRect.USER32(?,?), ref: 00430364
            • GetSystemMetrics.USER32(0000000F), ref: 004303B1
            • GetWindowRect.USER32(?,?), ref: 004303C3
            • ScreenToClient.USER32(?,?), ref: 004303EC
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Rect$Client$Window$MetricsScreenSystem
            • String ID:
            • API String ID: 3220332590-0
            • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
            • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
            • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _malloc_wcslen$_strcat_wcscpy
            • String ID:
            • API String ID: 1612042205-0
            • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
            • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
            • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
            • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: >$U$\
            • API String ID: 2666721431-237099441
            • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
            • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
            • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
            APIs
            • GetKeyboardState.USER32(?), ref: 0044C570
            • SetKeyboardState.USER32(00000080), ref: 0044C594
            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
            • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessagePost$KeyboardState$InputSend
            • String ID:
            • API String ID: 2221674350-0
            • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
            • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
            • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcscpy$_wcscat
            • String ID:
            • API String ID: 2037614760-0
            • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
            • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
            • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
            APIs
            • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
            • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
            • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
            • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
            • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
            • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Copy$AllocClearErrorLastString
            • String ID:
            • API String ID: 960795272-0
            • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
            • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
            • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
            APIs
            • BeginPaint.USER32(00000000,?), ref: 00447BDF
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 4189319755-0
            • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
            • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
            • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
            APIs
            • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
            • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
            • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
            • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
            • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$LongWindow$InvalidateRect
            • String ID:
            • API String ID: 1976402638-0
            • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
            • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
            • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
            APIs
            • ShowWindow.USER32(?,00000000), ref: 00440A8A
            • EnableWindow.USER32(?,00000000), ref: 00440AAF
            • ShowWindow.USER32(?,00000000), ref: 00440B18
            • ShowWindow.USER32(?,00000004), ref: 00440B2B
            • EnableWindow.USER32(?,00000001), ref: 00440B50
            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Show$Enable$MessageSend
            • String ID:
            • API String ID: 642888154-0
            • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
            • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
            • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
            APIs
            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Enable$Show$MessageSend
            • String ID:
            • API String ID: 1871949834-0
            • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
            • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
            • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
            • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
            • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
            APIs
            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
            • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
            • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
            • SendMessageW.USER32 ref: 00471AE3
            • DestroyIcon.USER32(?), ref: 00471AF4
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
            • String ID:
            • API String ID: 3611059338-0
            • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
            • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
            • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DestroyWindow$DeleteObject$IconMove
            • String ID:
            • API String ID: 1640429340-0
            • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
            • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
            • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • _wcslen.LIBCMT ref: 004438CD
            • _wcslen.LIBCMT ref: 004438E6
            • _wcstok.LIBCMT ref: 004438F8
            • _wcslen.LIBCMT ref: 0044390C
            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
            • _wcstok.LIBCMT ref: 00443931
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
            • String ID:
            • API String ID: 3632110297-0
            • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
            • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
            • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$DeleteMenuObject$IconWindow
            • String ID:
            • API String ID: 752480666-0
            • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
            • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
            • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
            • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
            • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconImageList_
            • String ID:
            • API String ID: 3275902921-0
            • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
            • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
            • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
            APIs
            • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: PerformanceQuery$CounterSleep$Frequency
            • String ID:
            • API String ID: 2833360925-0
            • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
            • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
            • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
            APIs
            • SendMessageW.USER32 ref: 004555C7
            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DeleteDestroyMessageObjectSend$IconWindow
            • String ID:
            • API String ID: 3691411573-0
            • Opcode ID: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
            • Instruction ID: ee39a3c17b45488341a0d6beee4a1abd3419bb98b1a9b0cd73eda499273a4889
            • Opcode Fuzzy Hash: da631fe096052ef5bd48ea011818ab2276afcb1e35ba95b92101ff2cabc01c83
            • Instruction Fuzzy Hash: C011B6B12047419BC710DF65EDC8A2A77A8BF18322F10066AFD50DB2D2D779D849C729
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
            • LineTo.GDI32(?,?,?), ref: 004472AC
            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
            • LineTo.GDI32(?,?,?), ref: 004472C6
            • EndPath.GDI32(?), ref: 004472D6
            • StrokePath.GDI32(?), ref: 004472E4
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
            • String ID:
            • API String ID: 372113273-0
            • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
            • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
            • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
            APIs
            • GetDC.USER32(00000000), ref: 0044CC6D
            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CapsDevice$Release
            • String ID:
            • API String ID: 1035833867-0
            • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
            • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
            • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
            APIs
            • __getptd.LIBCMT ref: 0041708E
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __amsg_exit.LIBCMT ref: 004170AE
            • __lock.LIBCMT ref: 004170BE
            • InterlockedDecrement.KERNEL32(?), ref: 004170DB
            • _free.LIBCMT ref: 004170EE
            • InterlockedIncrement.KERNEL32(00A02D20), ref: 00417106
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
            • String ID:
            • API String ID: 3470314060-0
            • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
            • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
            • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
            APIs
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
            • EnterCriticalSection.KERNEL32(?), ref: 0044B666
            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
              • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
            • String ID:
            • API String ID: 3495660284-0
            • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
            • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
            • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
            APIs
            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Virtual
            • String ID:
            • API String ID: 4278518827-0
            • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
            • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
            • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
            APIs
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
            • String ID:
            • API String ID: 442100245-0
            • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
            • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
            • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
            • _wcslen.LIBCMT ref: 0045F94A
            • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
            • String ID: 0
            • API String ID: 621800784-4108050209
            • Opcode ID: 3fff2d21101a3002be7827e03843c7eb0ebd2a2980f4407c0443b1afb9236a38
            • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
            • Opcode Fuzzy Hash: 3fff2d21101a3002be7827e03843c7eb0ebd2a2980f4407c0443b1afb9236a38
            • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SetErrorMode.KERNEL32 ref: 004781CE
            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
            • SetErrorMode.KERNEL32(?), ref: 00478270
            • SetErrorMode.KERNEL32(?), ref: 00478340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$AttributesFile_memmove_wcslen
            • String ID: \VH
            • API String ID: 3884216118-234962358
            • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
            • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
            • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
            APIs
            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
            • IsMenu.USER32(?), ref: 0044854D
            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
            • DrawMenuBar.USER32 ref: 004485AF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$Item$DrawInfoInsert
            • String ID: 0
            • API String ID: 3076010158-4108050209
            • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
            • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
            • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$_memmove_wcslen
            • String ID: ComboBox$ListBox
            • API String ID: 1589278365-1403004172
            • Opcode ID: 76e3401baae3ec8a9934b577b7d443cfc4906ac4f0cdecef2321dd9f3a6eafea
            • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
            • Opcode Fuzzy Hash: 76e3401baae3ec8a9934b577b7d443cfc4906ac4f0cdecef2321dd9f3a6eafea
            • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
            • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
            • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
            APIs
            • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Handle
            • String ID: nul
            • API String ID: 2519475695-2873401336
            • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
            • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
            • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: SysAnimate32
            • API String ID: 0-1011021900
            • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
            • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
            • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
            APIs
              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
              • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
              • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
              • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
              • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
            • GetFocus.USER32 ref: 0046157B
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
            • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
            • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
            • __swprintf.LIBCMT ref: 00461608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
            • String ID: %s%d
            • API String ID: 2645982514-1110647743
            • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
            • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
            • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
            • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
            • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
            APIs
            • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
            • CloseHandle.KERNEL32(00000000), ref: 00475A4D
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$CloseCountersCurrentHandleOpen
            • String ID:
            • API String ID: 3488606520-0
            • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
            • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
            • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
            APIs
              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ConnectRegistry_memmove_wcslen
            • String ID:
            • API String ID: 15295421-0
            • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
            • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
            • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
            APIs
            • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
            • GetProcAddress.KERNEL32(?,?), ref: 004648F7
            • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
            • GetProcAddress.KERNEL32(?,?), ref: 0046495A
            • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressProc$Library$FreeLoad
            • String ID:
            • API String ID: 2449869053-0
            • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
            • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
            • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
            APIs
            • GetCursorPos.USER32(?), ref: 004563A6
            • ScreenToClient.USER32(?,?), ref: 004563C3
            • GetAsyncKeyState.USER32(?), ref: 00456400
            • GetAsyncKeyState.USER32(?), ref: 00456410
            • GetWindowLongW.USER32(?,000000F0), ref: 00456466
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AsyncState$ClientCursorLongScreenWindow
            • String ID:
            • API String ID: 3539004672-0
            • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
            • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
            • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
            APIs
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
            • Sleep.KERNEL32(0000000A), ref: 0047D455
            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Interlocked$DecrementIncrement$Sleep
            • String ID:
            • API String ID: 327565842-0
            • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
            • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
            • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
            APIs
            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: PrivateProfile$SectionWrite$String
            • String ID:
            • API String ID: 2832842796-0
            • Opcode ID: 7b3c99b557ace6810e1294e0b9a285d6baa8f81f44fc55ef8670d8c6fada428a
            • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
            • Opcode Fuzzy Hash: 7b3c99b557ace6810e1294e0b9a285d6baa8f81f44fc55ef8670d8c6fada428a
            • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
            APIs
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
            • RegCloseKey.ADVAPI32(?), ref: 00441CFE
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Enum$CloseDeleteOpen
            • String ID:
            • API String ID: 2095303065-0
            • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
            • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
            • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
            APIs
            • GetWindowRect.USER32(?,?), ref: 00436A24
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: RectWindow
            • String ID:
            • API String ID: 861336768-0
            • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
            • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
            • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
            APIs
            • SendMessageW.USER32 ref: 00449598
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
            • _wcslen.LIBCMT ref: 0044960D
            • _wcslen.LIBCMT ref: 0044961A
            • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$_wcslen$_wcspbrk
            • String ID:
            • API String ID: 1856069659-0
            • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
            • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
            • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
            APIs
            • GetCursorPos.USER32(?), ref: 004478E2
            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
            • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
            • GetCursorPos.USER32(00000000), ref: 0044796A
            • TrackPopupMenuEx.USER32(00A06370,00000000,00000000,?,?,00000000), ref: 00447991
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CursorMenuPopupTrack$Proc
            • String ID:
            • API String ID: 1300944170-0
            • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
            • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
            • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
            APIs
            • GetClientRect.USER32(?,?), ref: 004479CC
            • GetCursorPos.USER32(?), ref: 004479D7
            • ScreenToClient.USER32(?,?), ref: 004479F3
            • WindowFromPoint.USER32(?,?), ref: 00447A34
            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Client$CursorFromPointProcRectScreenWindow
            • String ID:
            • API String ID: 1822080540-0
            • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
            • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
            • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
            APIs
            • GetWindowRect.USER32(?,?), ref: 00447C5D
            • ScreenToClient.USER32(?,?), ref: 00447C7B
            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
            • EndPaint.USER32(?,?), ref: 00447D13
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ClientPaintRectRectangleScreenViewportWindow
            • String ID:
            • API String ID: 659298297-0
            • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
            • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
            • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
            APIs
            • EnableWindow.USER32(?,00000000), ref: 00448B5C
            • EnableWindow.USER32(?,00000001), ref: 00448B72
            • ShowWindow.USER32(?,00000000), ref: 00448BE8
            • ShowWindow.USER32(?,00000004), ref: 00448BF4
            • EnableWindow.USER32(?,00000001), ref: 00448C09
              • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
              • Part of subcall function 00440D98: SendMessageW.USER32(00A01AD8,000000F1,00000000,00000000), ref: 00440E6E
              • Part of subcall function 00440D98: SendMessageW.USER32(00A01AD8,000000F1,00000001,00000000), ref: 00440E9A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$EnableMessageSend$LongShow
            • String ID:
            • API String ID: 142311417-0
            • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
            • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
            • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
            • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
            • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
            APIs
            • IsWindowVisible.USER32(?), ref: 00445879
            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
            • _wcslen.LIBCMT ref: 004458FB
            • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
            • String ID:
            • API String ID: 3087257052-0
            • Opcode ID: 1e2b4e7ef89ca78fd01b9ffb4f8b837766eeb74b5d02f2f4ee5553db66ac79b0
            • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
            • Opcode Fuzzy Hash: 1e2b4e7ef89ca78fd01b9ffb4f8b837766eeb74b5d02f2f4ee5553db66ac79b0
            • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
            APIs
              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
            • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
            • connect.WSOCK32(00000000,?,00000010), ref: 00465446
            • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
            • closesocket.WSOCK32(00000000,00000000), ref: 00465481
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLast$closesocketconnectinet_addrsocket
            • String ID:
            • API String ID: 245547762-0
            • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
            • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
            • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
            APIs
            • DeleteObject.GDI32(00000000), ref: 004471D8
            • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
            • SelectObject.GDI32(?,00000000), ref: 00447228
            • BeginPath.GDI32(?), ref: 0044723D
            • SelectObject.GDI32(?,00000000), ref: 00447266
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Object$Select$BeginCreateDeletePath
            • String ID:
            • API String ID: 2338827641-0
            • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
            • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
            • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
            APIs
            • Sleep.KERNEL32(00000000), ref: 00434598
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
            • Sleep.KERNEL32(00000000), ref: 004345D4
            • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CounterPerformanceQuerySleep
            • String ID:
            • API String ID: 2875609808-0
            • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
            • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
            • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
            APIs
            • GetDlgItem.USER32(?,000003E9), ref: 00460C17
            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
            • MessageBeep.USER32(00000000), ref: 00460C46
            • KillTimer.USER32(?,0000040A), ref: 00460C68
            • EndDialog.USER32(?,00000001), ref: 00460C83
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: BeepDialogItemKillMessageTextTimerWindow
            • String ID:
            • API String ID: 3741023627-0
            • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
            • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
            • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$Icon
            • String ID:
            • API String ID: 4023252218-0
            • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
            • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
            • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
            APIs
            • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconMessageSendWindow
            • String ID:
            • API String ID: 1489400265-0
            • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
            • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
            • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
            APIs
              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
            • DestroyWindow.USER32(?), ref: 00455728
            • DeleteObject.GDI32(?), ref: 00455736
            • DeleteObject.GDI32(?), ref: 00455744
            • DestroyIcon.USER32(?), ref: 00455752
            • DestroyWindow.USER32(?), ref: 00455760
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
            • String ID:
            • API String ID: 1042038666-0
            • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
            • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
            • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
            APIs
            • __getptd.LIBCMT ref: 0041780F
              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
            • __getptd.LIBCMT ref: 00417826
            • __amsg_exit.LIBCMT ref: 00417834
            • __lock.LIBCMT ref: 00417844
            • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
            • String ID:
            • API String ID: 938513278-0
            • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
            • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
            • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 00413D20
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
            • ExitThread.KERNEL32 ref: 00413D4E
            • GetCurrentThreadId.KERNEL32 ref: 00413D54
            • __freefls@4.LIBCMT ref: 00413D74
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 2403457894-0
            • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
            • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
            • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
            APIs
              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
            • ___set_flsgetvalue.LIBCMT ref: 004151C0
              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
            • ___fls_getvalue@4.LIBCMT ref: 004151CB
              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
            • ___fls_setvalue@8.LIBCMT ref: 004151DD
            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
            • ExitThread.KERNEL32 ref: 004151ED
            • __freefls@4.LIBCMT ref: 00415209
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
            • String ID:
            • API String ID: 4247068974-0
            • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
            • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
            • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID:
            • String ID: )$U$\
            • API String ID: 0-3705770531
            • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
            • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
            • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 0046E505
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
            • CoUninitialize.OLE32 ref: 0046E53D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
            • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
            • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
            • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
            • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
            • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
            • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
            • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
            • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
            • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
            • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
            • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
            Strings
            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
            • API String ID: 708495834-557222456
            • Opcode ID: fac892481d924faf91c45d91b33e8832c0b361392b7fa4edc49b5a3d22954602
            • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
            • Opcode Fuzzy Hash: fac892481d924faf91c45d91b33e8832c0b361392b7fa4edc49b5a3d22954602
            • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
            APIs
              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
            • CoInitialize.OLE32(00000000), ref: 00478442
            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
            • CoUninitialize.OLE32 ref: 0047863C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateInitializeInstanceUninitialize_wcslen
            • String ID: .lnk
            • API String ID: 886957087-24824748
            • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
            • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
            • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
            APIs
              • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
              • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
              • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
              • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
              • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
            • String ID: @
            • API String ID: 4150878124-2766056989
            • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
            • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
            • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$]$h
            • API String ID: 4104443479-3262404753
            • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
            • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
            • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
            APIs
            • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • CloseHandle.KERNEL32(?), ref: 00457E09
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CloseExecuteHandleShell_wcscpy_wcslen
            • String ID: <$@
            • API String ID: 2417854910-1426351568
            • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
            • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
            • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
            • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
            APIs
            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
            • String ID:
            • API String ID: 3705125965-3916222277
            • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
            • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
            • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
            APIs
            • GetMenuItemInfoW.USER32 ref: 0045FAC4
            • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
            • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$Delete$InfoItem
            • String ID: 0
            • API String ID: 135850232-4108050209
            • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
            • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
            • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
            APIs
            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
            • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Long
            • String ID: SysTreeView32
            • API String ID: 847901565-1698111956
            • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
            • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
            • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
            APIs
            • LoadLibraryA.KERNEL32(?), ref: 00434B10
            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
            • FreeLibrary.KERNEL32(?), ref: 00434B9F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Library$AddressFreeLoadProc
            • String ID: AU3_GetPluginDetails
            • API String ID: 145871493-4132174516
            • Opcode ID: 370df5f0de2e0518f2a08b97302dffa77e8c256a3f35603dc40bd22eab7c0f05
            • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
            • Opcode Fuzzy Hash: 370df5f0de2e0518f2a08b97302dffa77e8c256a3f35603dc40bd22eab7c0f05
            • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
            APIs
            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$Window
            • String ID: SysMonthCal32
            • API String ID: 2326795674-1439706946
            • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
            • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
            • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
            APIs
            • DestroyWindow.USER32(00000000), ref: 00450A2F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DestroyWindow
            • String ID: msctls_updown32
            • API String ID: 3375834691-2298589950
            • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
            • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
            • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: $<
            • API String ID: 4104443479-428540627
            • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
            • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
            • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
            • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
            • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
            • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
            • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$DiskFreeSpace
            • String ID: \VH
            • API String ID: 1682464887-234962358
            • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
            • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
            • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
            • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
            • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$InformationVolume
            • String ID: \VH
            • API String ID: 2507767853-234962358
            • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
            • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
            • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
            APIs
            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: msctls_trackbar32
            • API String ID: 3850602802-1010561917
            • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
            • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
            • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • CLSIDFromString.OLE32(?,00000000), ref: 00435236
            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
            • String ID: crts
            • API String ID: 943502515-3724388283
            • Opcode ID: 3fc01f6affe693cc24f25e2fc7637460d04805ab5607173d16afdd214e1cc27c
            • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
            • Opcode Fuzzy Hash: 3fc01f6affe693cc24f25e2fc7637460d04805ab5607173d16afdd214e1cc27c
            • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
            APIs
            • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
            • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
            • SetErrorMode.KERNEL32(?), ref: 0045D35C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorMode$LabelVolume
            • String ID: \VH
            • API String ID: 2006950084-234962358
            • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
            • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
            • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
            APIs
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • GetMenuItemInfoW.USER32 ref: 00449727
            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
            • DrawMenuBar.USER32 ref: 00449761
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Menu$InfoItem$Draw_malloc
            • String ID: 0
            • API String ID: 772068139-4108050209
            • Opcode ID: 0735be47179a236d62f0b3ee7ec9ab542aee013fdc902971e67a57cc85d2bea2
            • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
            • Opcode Fuzzy Hash: 0735be47179a236d62f0b3ee7ec9ab542aee013fdc902971e67a57cc85d2bea2
            • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$_wcscpy
            • String ID: 3, 3, 8, 1
            • API String ID: 3469035223-357260408
            • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
            • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
            • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCloseHandle
            • API String ID: 2574300362-3530519716
            • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
            • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
            • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpCreateFile
            • API String ID: 2574300362-275556492
            • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
            • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
            • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
            APIs
            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: ICMP.DLL$IcmpSendEcho
            • API String ID: 2574300362-58917771
            • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
            • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
            • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
            APIs
            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: RegDeleteKeyExW$advapi32.dll
            • API String ID: 2574300362-4033151799
            • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
            • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
            • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
            APIs
            • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
            • __itow.LIBCMT ref: 004699CD
              • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
            • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
            • __itow.LIBCMT ref: 00469A97
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$__itow
            • String ID:
            • API String ID: 3379773720-0
            • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
            • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
            • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00449A4A
            • ScreenToClient.USER32(?,?), ref: 00449A80
            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$ClientMoveRectScreen
            • String ID:
            • API String ID: 3880355969-0
            • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
            • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
            • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
            • String ID:
            • API String ID: 2782032738-0
            • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
            • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
            • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
            APIs
            • ClientToScreen.USER32(00000000,?), ref: 0044169A
            • GetWindowRect.USER32(?,?), ref: 00441722
            • PtInRect.USER32(?,?,?), ref: 00441734
            • MessageBeep.USER32(00000000), ref: 004417AD
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Rect$BeepClientMessageScreenWindow
            • String ID:
            • API String ID: 1352109105-0
            • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
            • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
            • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
            APIs
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
            • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
            • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CreateHardLink$DeleteErrorFileLast
            • String ID:
            • API String ID: 3321077145-0
            • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
            • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
            • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
            • __isleadbyte_l.LIBCMT ref: 004208A6
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID:
            • API String ID: 3058430110-0
            • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
            • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
            • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
            APIs
            • GetParent.USER32(?), ref: 004503C8
            • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
            • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
            • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Proc$Parent
            • String ID:
            • API String ID: 2351499541-0
            • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
            • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
            • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
            APIs
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
            • TranslateMessage.USER32(?), ref: 00442B01
            • DispatchMessageW.USER32(?), ref: 00442B0B
            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Message$Peek$DispatchTranslate
            • String ID:
            • API String ID: 1795658109-0
            • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
            • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
            • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
            APIs
            • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
            • GetCaretPos.USER32(?), ref: 004743B2
            • ClientToScreen.USER32(00000000,?), ref: 004743E8
            • GetForegroundWindow.USER32 ref: 004743EE
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
            • String ID:
            • API String ID: 2759813231-0
            • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
            • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
            • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
            APIs
              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
            • _wcslen.LIBCMT ref: 00449519
            • _wcslen.LIBCMT ref: 00449526
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend_wcslen$_wcspbrk
            • String ID:
            • API String ID: 2886238975-0
            • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
            • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
            • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __setmode$DebugOutputString_fprintf
            • String ID:
            • API String ID: 1792727568-0
            • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
            • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
            • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
            APIs
              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
            • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$Long$AttributesLayered
            • String ID:
            • API String ID: 2169480361-0
            • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
            • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
            • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
            APIs
              • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
              • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
              • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
            • lstrlenW.KERNEL32(?), ref: 00434CF6
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
            • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: lstrcmpilstrcpylstrlen$_malloc
            • String ID: cdecl
            • API String ID: 3850814276-3896280584
            • Opcode ID: eab5caaf8cebb6f5662be367d5553fa0266aedcf90c4b6dcb8dc903e3d6702f8
            • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
            • Opcode Fuzzy Hash: eab5caaf8cebb6f5662be367d5553fa0266aedcf90c4b6dcb8dc903e3d6702f8
            • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
            APIs
              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
            • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
            • _memmove.LIBCMT ref: 0046D475
            • inet_ntoa.WSOCK32(?), ref: 0046D481
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
            • String ID:
            • API String ID: 2502553879-0
            • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
            • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
            • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
            APIs
            • SendMessageW.USER32 ref: 00448C69
            • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend$LongWindow
            • String ID:
            • API String ID: 312131281-0
            • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
            • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
            • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
            APIs
            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
            • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
            • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLastacceptselect
            • String ID:
            • API String ID: 385091864-0
            • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
            • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
            • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
            APIs
            • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
            • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
            • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
            APIs
            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
            • GetStockObject.GDI32(00000011), ref: 00430258
            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
            • ShowWindow.USER32(00000000,00000000), ref: 0043027D
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Window$CreateMessageObjectSendShowStock
            • String ID:
            • API String ID: 1358664141-0
            • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
            • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
            • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00443CA6
            • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
            • CloseHandle.KERNEL32(00000000), ref: 00443CF9
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
            • String ID:
            • API String ID: 2880819207-0
            • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
            • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
            • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
            APIs
            • GetWindowRect.USER32(?,?), ref: 00430BA2
            • ScreenToClient.USER32(?,?), ref: 00430BC1
            • ScreenToClient.USER32(?,?), ref: 00430BE2
            • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ClientRectScreen$InvalidateWindow
            • String ID:
            • API String ID: 357397906-0
            • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
            • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
            • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
            APIs
            • __wsplitpath.LIBCMT ref: 0043392E
              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
            • __wsplitpath.LIBCMT ref: 00433950
            • __wcsicoll.LIBCMT ref: 00433974
            • __wcsicoll.LIBCMT ref: 0043398A
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
            • String ID:
            • API String ID: 1187119602-0
            • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
            • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
            • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcslen$_malloc_wcscat_wcscpy
            • String ID:
            • API String ID: 1597257046-0
            • Opcode ID: 5ab67e947389c1bd354b8ecd579da357cbff7886dd3d022b7bd5ccc19f2b0eaa
            • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
            • Opcode Fuzzy Hash: 5ab67e947389c1bd354b8ecd579da357cbff7886dd3d022b7bd5ccc19f2b0eaa
            • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
            APIs
            • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
            • __malloc_crt.LIBCMT ref: 0041F5B6
            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free__malloc_crt
            • String ID:
            • API String ID: 237123855-0
            • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
            • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
            • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: DeleteDestroyObject$IconWindow
            • String ID:
            • API String ID: 3349847261-0
            • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
            • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
            • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
            APIs
            • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
            • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
            • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
            • String ID:
            • API String ID: 2223660684-0
            • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
            • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
            • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
            APIs
              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
            • LineTo.GDI32(?,?,?), ref: 00447326
            • EndPath.GDI32(?), ref: 00447336
            • StrokePath.GDI32(?), ref: 00447344
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
            • String ID:
            • API String ID: 2783949968-0
            • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
            • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
            • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
            APIs
            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
            • GetCurrentThreadId.KERNEL32 ref: 004364A3
            • AttachThreadInput.USER32(00000000), ref: 004364AA
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
            • String ID:
            • API String ID: 2710830443-0
            • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
            • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
            • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
            APIs
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
              • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
              • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
            • String ID:
            • API String ID: 146765662-0
            • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
            • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
            • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
            APIs
            • GetDesktopWindow.USER32 ref: 00472B63
            • GetDC.USER32(00000000), ref: 00472B6C
            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
            • ReleaseDC.USER32(00000000,?), ref: 00472B99
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
            • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
            • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
            APIs
            • GetDesktopWindow.USER32 ref: 00472BB2
            • GetDC.USER32(00000000), ref: 00472BBB
            • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
            • ReleaseDC.USER32(00000000,?), ref: 00472BE8
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CapsDesktopDeviceReleaseWindow
            • String ID:
            • API String ID: 2889604237-0
            • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
            • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
            • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
            APIs
            • __getptd_noexit.LIBCMT ref: 00415150
              • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
              • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
              • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
              • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
              • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
            • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
            • __freeptd.LIBCMT ref: 0041516B
            • ExitThread.KERNEL32 ref: 00415173
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
            • String ID:
            • API String ID: 1454798553-0
            • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
            • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
            • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _strncmp
            • String ID: Q\E
            • API String ID: 909875538-2189900498
            • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
            • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
            • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
            APIs
            • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
              • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
              • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
            • String ID: AutoIt3GUI$Container
            • API String ID: 2652923123-3941886329
            • Opcode ID: 3d5c164e87d551de86ccd05ea0fc6d989d571fe0928e70dc751cc97fd770ab96
            • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
            • Opcode Fuzzy Hash: 3d5c164e87d551de86ccd05ea0fc6d989d571fe0928e70dc751cc97fd770ab96
            • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove_strncmp
            • String ID: U$\
            • API String ID: 2666721431-100911408
            • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
            • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
            • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
            APIs
              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
            • __wcsnicmp.LIBCMT ref: 00467288
            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Connection__wcsnicmp_wcscpy_wcslen
            • String ID: LPT
            • API String ID: 3035604524-1350329615
            • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
            • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
            • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
            • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \$h
            • API String ID: 4104443479-677774858
            • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
            • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
            • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memcmp
            • String ID: &
            • API String ID: 2931989736-1010288
            • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
            • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
            • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: \
            • API String ID: 4104443479-2967466578
            • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
            • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
            • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
            APIs
            • _wcslen.LIBCMT ref: 00466825
            • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CrackInternet_wcslen
            • String ID: |
            • API String ID: 596671847-2343686810
            • Opcode ID: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
            • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
            • Opcode Fuzzy Hash: 7cb74d60865eca5b28057979f277cd03318605ef9fe3268a007aa21ef86e616b
            • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
            APIs
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: '
            • API String ID: 3850602802-1997036262
            • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
            • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
            • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
            APIs
            • _strlen.LIBCMT ref: 0040F858
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
            • _sprintf.LIBCMT ref: 0040F9AE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove$_sprintf_strlen
            • String ID: %02X
            • API String ID: 1921645428-436463671
            • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
            • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
            • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
            APIs
            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: Combobox
            • API String ID: 3850602802-2096851135
            • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
            • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
            • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
            APIs
            • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: LengthMessageSendTextWindow
            • String ID: edit
            • API String ID: 2978978980-2167791130
            • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
            • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
            • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
            APIs
            • Sleep.KERNEL32(00000000), ref: 00476CB0
            • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: GlobalMemorySleepStatus
            • String ID: @
            • API String ID: 2783356886-2766056989
            • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
            • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
            • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: htonsinet_addr
            • String ID: 255.255.255.255
            • API String ID: 3832099526-2422070025
            • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
            • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
            • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
            APIs
            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: InternetOpen
            • String ID: <local>
            • API String ID: 2038078732-4266983199
            • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
            • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
            • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: __fread_nolock_memmove
            • String ID: EA06
            • API String ID: 1988441806-3962188686
            • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
            • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
            • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _memmove
            • String ID: u,D
            • API String ID: 4104443479-3858472334
            • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
            • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
            • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
            APIs
            • _wcslen.LIBCMT ref: 00401B11
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • _memmove.LIBCMT ref: 00401B57
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
            • String ID: @EXITCODE
            • API String ID: 2734553683-3436989551
            • Opcode ID: f269a4cbd32343e6f421fefd5587bc27b694718d98178b64f66077375e62c2a6
            • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
            • Opcode Fuzzy Hash: f269a4cbd32343e6f421fefd5587bc27b694718d98178b64f66077375e62c2a6
            • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
            APIs
            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
            • wsprintfW.USER32 ref: 0045612A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: MessageSend_mallocwsprintf
            • String ID: %d/%02d/%02d
            • API String ID: 1262938277-328681919
            • Opcode ID: ca481e77b96886376af8447e84e4816480923f84b4c644cc7985f328c9dd036e
            • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
            • Opcode Fuzzy Hash: ca481e77b96886376af8447e84e4816480923f84b4c644cc7985f328c9dd036e
            • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
            APIs
            • InternetCloseHandle.WININET(?), ref: 00442663
            • InternetCloseHandle.WININET ref: 00442668
              • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: CloseHandleInternet$ObjectSingleWait
            • String ID: aeB
            • API String ID: 857135153-906807131
            • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
            • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
            • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
            APIs
            Strings
            • ^B, xrefs: 00433248
            • C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe, xrefs: 0043324B
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: _wcsncpy
            • String ID: ^B$C:\Users\user\Desktop\TT 0205O241694086-CREDIT001.exe
            • API String ID: 1735881322-1846277232
            • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
            • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
            • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
            • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
            • PostMessageW.USER32(00000000), ref: 00441C05
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
            • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
            • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
            APIs
            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: FindMessagePostSleepWindow
            • String ID: Shell_TrayWnd
            • API String ID: 529655941-2988720461
            • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
            • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
            • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
            APIs
            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
              • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2122456771.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2122442241.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122498431.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122515216.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122530323.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122545429.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2122576318.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_TT 0205O241694086-CREDIT001.jbxd
            Similarity
            • API ID: Message_doexit
            • String ID: AutoIt$Error allocating memory.
            • API String ID: 1993061046-4017498283
            • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
            • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
            • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D