Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
Analysis ID:1521516
MD5:2e440604cac15e233d3832e00251592e
SHA1:50df05d9f86c9383ca5e6adef0df4b89089bca04
SHA256:7e57e8caddb50f98bd8b3f17fb9fd21372cc32b0147d5e3853f043745e204a41
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Sample or dropped binary is a compiled AutoHotkey binary
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
May check if the current machine is a sandbox (GetTickCount - Sleep)
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: z:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: x:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: v:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: t:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: r:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: p:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: n:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: l:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: j:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: h:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: f:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: b:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: y:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: w:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: u:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: s:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: q:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: o:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: m:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: k:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: i:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: g:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AE280 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AE280
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AE180 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AE180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003C900 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140066F70 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,GetLastError,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_0000000140066F70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400672D0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,free,malloc,0_2_00000001400672D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081680 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140067920 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081C70 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081C70
Source: unknownDNS traffic detected: query: weather.yahooapis.com replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007E4B0 _wcstoi64,InternetOpenW,InternetOpenUrlW,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,GetTickCount,PeekMessageW,GetTickCount,InternetReadFile,InternetReadFileExA,GetTickCount,PeekMessageW,GetTickCount,InternetReadFileExA,InternetCloseHandle,InternetCloseHandle,fclose,DeleteFileW,0_2_000000014007E4B0
Source: global trafficDNS traffic detected: DNS query: weather.yahooapis.com
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3038109100.000000000014C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weather.y
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002950000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=&u=
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2697255287.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2719249473.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2628389658.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2646483608.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2341924681.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2214027953.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2157956565.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2395587454.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2428639237.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2294387085.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2352606610.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2305184919.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2840198841.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3070754339.000000000014D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2817203305.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2363494558.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3027442002.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2519051558.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2417946215.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2461119307.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2136474486.000000000014C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=693838&u=c
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2439550147.000000000014C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=693838&u=c4.amsi.csv
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3038109100.000000000014C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=693838&u=cX
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeString found in binary or memory: https://autohotkey.com
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeString found in binary or memory: https://autohotkey.comCould
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeString found in binary or memory: https://soowim.tistory.com/303
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002950000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://soowim.tistory.com/303C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400065B0 GetTickCount,OpenClipboard,GetTickCount,OpenClipboard,0_2_00000001400065B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140006210 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,0_2_0000000140006210
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B12E0 EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,0_2_00000001400B12E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140006490 GetClipboardFormatNameW,GetClipboardData,0_2_0000000140006490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140054F30 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,free,free,free,free,malloc,0_2_0000000140054F30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140016730 GetTickCount,PeekMessageW,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,0_2_0000000140016730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWindows user hook set: 0 mouse low level C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140001ABC GlobalUnlock,CloseClipboard,SetTimer,GetTickCount,GetMessageW,GetTickCount,GetFocus,TranslateAcceleratorW,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,PostMessageW,SendMessageW,SendMessageW,IsDialogMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,SetCurrentDirectoryW,KillTimer,0_2_0000000140001ABC

System Summary

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005F650: CreateFileW,DeviceIoControl,CloseHandle,0_2_000000014005F650
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081CF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0000000140081CF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400561500_2_0000000140056150
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000A8200_2_000000014000A820
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400869B00_2_00000001400869B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008CC400_2_000000014008CC40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140006D400_2_0000000140006D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001EFA00_2_000000014001EFA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005F7200_2_000000014005F720
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400898900_2_0000000140089890
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140001ABC0_2_0000000140001ABC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097CC00_2_0000000140097CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008FF700_2_000000014008FF70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006BFB00_2_000000014006BFB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004A0100_2_000000014004A010
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004C0700_2_000000014004C070
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003A0A50_2_000000014003A0A5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400BE0C00_2_00000001400BE0C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400621000_2_0000000140062100
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005C1000_2_000000014005C100
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400BC1B00_2_00000001400BC1B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400201C30_2_00000001400201C3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008E1E00_2_000000014008E1E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400501F80_2_00000001400501F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009E2400_2_000000014009E240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004624B0_2_000000014004624B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400A02F00_2_00000001400A02F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D63D00_2_00000001400D63D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004E3CB0_2_000000014004E3CB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004A3E00_2_000000014004A3E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000A4000_2_000000014000A400
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004C4100_2_000000014004C410
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005A4400_2_000000014005A440
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007E4B00_2_000000014007E4B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400904CD0_2_00000001400904CD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400904DC0_2_00000001400904DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400904F80_2_00000001400904F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009051A0_2_000000014009051A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400DE5200_2_00000001400DE520
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009053B0_2_000000014009053B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400905470_2_0000000140090547
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009056D0_2_000000014009056D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004656B0_2_000000014004656B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400905AE0_2_00000001400905AE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400885A10_2_00000001400885A1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009A5E80_2_000000014009A5E8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400926580_2_0000000140092658
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B26700_2_00000001400B2670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400286C00_2_00000001400286C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008A6D00_2_000000014008A6D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000273B0_2_000000014000273B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014002A7700_2_000000014002A770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B07E00_2_00000001400B07E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400808100_2_0000000140080810
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005C8600_2_000000014005C860
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007E8800_2_000000014007E880
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400988A00_2_00000001400988A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004C8B00_2_000000014004C8B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400588C00_2_00000001400588C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009A8C50_2_000000014009A8C5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400709200_2_0000000140070920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400209300_2_0000000140020930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005094D0_2_000000014005094D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005E9700_2_000000014005E970
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400409C00_2_00000001400409C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AC9D00_2_00000001400AC9D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007A9E00_2_000000014007A9E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140008A400_2_0000000140008A40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D2AE40_2_00000001400D2AE4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140072B000_2_0000000140072B00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B8B300_2_00000001400B8B30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AEB800_2_00000001400AEB80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140052BB00_2_0000000140052BB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140050BB20_2_0000000140050BB2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140048BC00_2_0000000140048BC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006EC400_2_000000014006EC40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007CC3F0_2_000000014007CC3F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400C8C700_2_00000001400C8C70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140032C880_2_0000000140032C88
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140046CC00_2_0000000140046CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140060CD90_2_0000000140060CD9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140074D200_2_0000000140074D20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140094D500_2_0000000140094D50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D6D5C0_2_00000001400D6D5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140076D600_2_0000000140076D60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140058D800_2_0000000140058D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400CEE400_2_00000001400CEE40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140080E400_2_0000000140080E40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140044E800_2_0000000140044E80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004AE900_2_000000014004AE90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140012ED00_2_0000000140012ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140018ED00_2_0000000140018ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140054F300_2_0000000140054F30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140050FD00_2_0000000140050FD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001401270000_2_0000000140127000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400150000_2_0000000140015000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D70300_2_00000001400D7030
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400650500_2_0000000140065050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B30D00_2_00000001400B30D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400110D00_2_00000001400110D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009712B0_2_000000014009712B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400971390_2_0000000140097139
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400971440_2_0000000140097144
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006D1600_2_000000014006D160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007B1700_2_000000014007B170
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400631800_2_0000000140063180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003F1C00_2_000000014003F1C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400751E00_2_00000001400751E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400972000_2_0000000140097200
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400972190_2_0000000140097219
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400972210_2_0000000140097221
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400032360_2_0000000140003236
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400172400_2_0000000140017240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400972370_2_0000000140097237
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005B2900_2_000000014005B290
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400612A00_2_00000001400612A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000D2F00_2_000000014000D2F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005D3B00_2_000000014005D3B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400993D00_2_00000001400993D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400393D90_2_00000001400393D9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400574000_2_0000000140057400
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009D4200_2_000000014009D420
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007F4400_2_000000014007F440
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005F4500_2_000000014005F450
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400594900_2_0000000140059490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400254B00_2_00000001400254B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400994BB0_2_00000001400994BB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007B4E00_2_000000014007B4E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004B5100_2_000000014004B510
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004F5100_2_000000014004F510
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400855D00_2_00000001400855D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400715F00_2_00000001400715F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400635F00_2_00000001400635F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400516900_2_0000000140051690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400156D00_2_00000001400156D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400196F00_2_00000001400196F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003F7300_2_000000014003F730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400437600_2_0000000140043760
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005B7D00_2_000000014005B7D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400997FC0_2_00000001400997FC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400337FF0_2_00000001400337FF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400658800_2_0000000140065880
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400358F80_2_00000001400358F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001B9000_2_000000014001B900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400179100_2_0000000140017910
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400A99200_2_00000001400A9920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D19600_2_00000001400D1960
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D99B00_2_00000001400D99B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400539B00_2_00000001400539B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400059C00_2_00000001400059C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400719D00_2_00000001400719D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004DA400_2_000000014004DA40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007DA480_2_000000014007DA48
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140069A800_2_0000000140069A80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006FA900_2_000000014006FA90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140039AB00_2_0000000140039AB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003FAD00_2_000000014003FAD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008FB000_2_000000014008FB00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140041B800_2_0000000140041B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140073BC00_2_0000000140073BC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140031BB90_2_0000000140031BB9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008DC130_2_000000014008DC13
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005DC400_2_000000014005DC40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140099C410_2_0000000140099C41
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004BCA00_2_000000014004BCA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014002BCA00_2_000000014002BCA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400CFCCC0_2_00000001400CFCCC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140057CD00_2_0000000140057CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001FD290_2_000000014001FD29
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007BD4E0_2_000000014007BD4E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140047D600_2_0000000140047D60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000DDA00_2_000000014000DDA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003DE200_2_000000014003DE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140013E400_2_0000000140013E40
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140063E700_2_0000000140063E70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400A3EF00_2_00000001400A3EF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140051F000_2_0000000140051F00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140093F100_2_0000000140093F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005FF220_2_000000014005FF22
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400DDF3C0_2_00000001400DDF3C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140099F4D0_2_0000000140099F4D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004FF4B0_2_000000014004FF4B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140085F600_2_0000000140085F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400BBF8B0_2_00000001400BBF8B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006DFA00_2_000000014006DFA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014000FFB00_2_000000014000FFB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014004DFC00_2_000000014004DFC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: String function: 00000001400CAB94 appears 59 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: String function: 00000001400CA93C appears 395 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: String function: 0000000140040410 appears 63 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: String function: 0000000140040760 appears 465 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: String function: 00000001400CB634 appears 38 times
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
Source: classification engineClassification label: mal52.evad.winEXE@1/0@4/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140041B80 CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081CF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0000000140081CF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014005F060 wcsncpy,GetDiskFreeSpaceExW,free,malloc,0_2_000000014005F060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081F80 CreateToolhelp32Snapshot,Process32FirstW,_wcstoi64,Process32NextW,Process32NextW,CloseHandle,CloseHandle,CloseHandle,0_2_0000000140081F80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140062100 _wcstoi64,CoCreateInstance,powf,powf,powf,log10,free,malloc,free,malloc,0_2_0000000140062100
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400207F0 FindResourceW,SizeofResource,LoadResource,LockResource,0_2_00000001400207F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeMutant created: \Sessions\1\BaseNamedObjects\AHK Mouse
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Process
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeStatic file information: File size 1417216 > 1048576
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B4320 LoadLibraryW,GetProcAddress,0_2_00000001400B4320
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeStatic PE information: section name: text
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014012A4CB push rbp; iretd 0_2_000000014012A4DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014006CC28 push rsp; retf 0_2_000000014006CC29
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009D020 push rdx; retn 0009h0_2_000000014009D029
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D914C push rbp; iretd 0_2_00000001400D9644
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097CC0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140097CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097CC0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140097CC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014008FF70 SendMessageW,MulDiv,MulDiv,free,free,free,free,free,free,free,free,free,free,free,free,COMRefPtr,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,DrawTextW,DrawTextW,GetCharABCWidthsW,MulDiv,GetSystemMetrics,GetSystemMetrics,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,SelectObject,ReleaseDC,SendMessageW,SendMessageW,GetClientRect,SetWindowLongW,SendMessageW,SetWindowLongW,MoveWindow,GetWindowRect,SendMessageW,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,MapWindowPoints,0_2_000000014008FF70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014009E240 SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,SetFocus,SendMessageW,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,0_2_000000014009E240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B24A0 GetForegroundWindow,IsWindowVisible,IsIconic,ShowWindow,0_2_00000001400B24A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B2670 GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,BringWindowToTop,0_2_00000001400B2670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400508A2 IsZoomed,IsIconic,0_2_00000001400508A2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AE940 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_00000001400AE940
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014007A9E0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCW,GetDC,GetPixel,DeleteDC,ReleaseDC,free,malloc,free,malloc,0_2_000000014007A9E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400A2A10 CheckMenuItem,CheckMenuItem,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetForegroundWindow,GetWindowThreadProcessId,SetForegroundWindow,SetForegroundWindow,TrackPopupMenuEx,PostMessageW,GetForegroundWindow,SetForegroundWindow,0_2_00000001400A2A10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140058D80 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,EnumChildWindows,GetClassNameW,EnumChildWindows,free,malloc,0_2_0000000140058D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140044E80 IsWindow,DestroyWindow,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,MonitorFromPoint,GetMonitorInfoW,IsWindow,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetWindowRect,SendMessageW,SendMessageW,0_2_0000000140044E80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140054F30 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,free,free,free,free,malloc,0_2_0000000140054F30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400570D0 SendMessageW,IsWindowVisible,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageW,0_2_00000001400570D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140069820 GetTickCount,GetForegroundWindow,GetTickCount,GetWindowThreadProcessId,GetGUIThreadInfo,ClientToScreen,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,_itow,0_2_0000000140069820
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400539B0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,SelectObject,DeleteDC,DeleteObject,free,free,malloc,GetPixel,ReleaseDC,free,malloc,free,malloc,0_2_00000001400539B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091DAD GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DAD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091DBD MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DBD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091DB5 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DB5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091DCB MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DCB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097DEF ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097DEF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097DE5 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097DE5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091E0F MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091E0F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097E1A ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097E1A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097E4C ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097E4C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091E47 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091E47
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140091E56 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091E56
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097EAA ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097EAA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140093F10 GetWindowLongW,GetWindowLongW,SetWindowPos,EnableWindow,GetWindowRect,GetClientRect,MulDiv,MulDiv,GetWindowRect,GetClientRect,MulDiv,MulDiv,_wcstoi64,IsWindow,SetParent,SetWindowLongPtrW,SetParent,IsWindowVisible,IsIconic,SetWindowLongW,SetWindowLongW,SetWindowPos,InvalidateRect,0_2_0000000140093F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097F08 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097F08
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140097F39 MulDiv,MulDiv,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097F39
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140018ED00_2_0000000140018ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeWindow / User API: foregroundWindowGot 926Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeAPI coverage: 2.1 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140018ED00_2_0000000140018ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001A8F0 GetKeyboardLayout followed by cmp: cmp dl, 00000019h and CTI: ja 000000014001AA6Dh country: Russian (ru)0_2_000000014001A8F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400229F7 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_00000001400229F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400229F7 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_00000001400229F7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400229FF GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_00000001400229FF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400229FF GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_00000001400229FF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A06 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_0000000140022A06
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A06 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_0000000140022A06
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A2D GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_0000000140022A2D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A2D GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_0000000140022A2D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A51 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_0000000140022A51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A51 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_0000000140022A51
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A75 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C2Ah country: Urdu (ur)0_2_0000000140022A75
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140022A75 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C2Ah country: Inuktitut (iu)0_2_0000000140022A75
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140015000 GetKeyboardLayout followed by cmp: cmp ecx, 0ah and CTI: jl 0000000140015362h country: Spanish (es)0_2_0000000140015000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140059490 GetLocalTime followed by cmp: cmp word ptr [rbx], cx and CTI: je 00000001400597C3h0_2_0000000140059490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140059490 GetLocalTime followed by cmp: cmp dx, ax and CTI: je 0000000140059683h0_2_0000000140059490
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AE280 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AE280
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400AE180 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AE180
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014003C900 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140066F70 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,GetLastError,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_0000000140066F70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400672D0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,free,malloc,0_2_00000001400672D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081680 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140067920 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140081C70 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081C70
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3070575798.000000000011E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140017FF0 BlockInput,free,BlockInput,0_2_0000000140017FF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400CEB34 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00000001400CEB34
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400B4320 LoadLibraryW,GetProcAddress,0_2_00000001400B4320
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D8698 GetProcessHeap,HeapAlloc,_errno,_errno,__doserrno,_errno,GetProcessHeap,HeapFree,SetEndOfFile,_errno,__doserrno,GetLastError,0_2_00000001400D8698
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400CEB34 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00000001400CEB34
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D37E4 SetUnhandledExceptionFilter,0_2_00000001400D37E4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D1940 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001400D1940
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140041B80 CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041B80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140017240 GetCurrentThreadId,GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,BlockInput,GetForegroundWindow,GetAsyncKeyState,keybd_event,GetAsyncKeyState,keybd_event,GetAsyncKeyState,BlockInput,0_2_0000000140017240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140018A50 mouse_event,0_2_0000000140018A50
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: Progman
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3070932499.00000000007E5000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: [Progman !
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: TextLEFTLRIGHTRMIDDLEMX1X2WUWDWLWR{Blind}{ClickLl{}^+!#{}RawTempASC U+ ,LWin RWin LShift RShift LCtrl RCtrl LAlt RAlt SYSTEM\CurrentControlSet\Control\Keyboard Layouts\Layout FileKbdLayerDescriptorsc%03Xvk%02XSCALTDOWNALTUPSHIFTDOWNSHIFTUPCTRLDOWNCONTROLDOWNCTRLUPCONTROLUPLWINDOWNLWINUPRWINDOWNRWINUPRtlGetVersionntdll.dll%u.%u.%uStdOutAllUnreachableClassOverwriteUseEnvLocalSameAsGlobalUseUnsetGlobalUseUnsetLocalYYYYYWeekYearYDayWorkingDirWinDirWinDelayWDayUserNameTitleMatchModeSpeedTitleMatchModeTimeSinceThisHotkeyTimeSincePriorHotkeyTimeIdlePhysicalTimeIdleMouseTimeIdleKeyboardTimeIdleTickCountThisMenuItemPosThisMenuItemThisMenuThisLabelThisHotkeyThisFuncStoreCapslockModeStartupCommonStartupStartMenuCommonStartMenuSecScriptNameScriptHwndScriptFullPathScriptDirScreenWidthScreenHeightScreenDPIRegViewPtrSizeProgramsCommonProgramsPriorKeyPriorHotkeyOSVersionOSTypeNumBatchLinesNowUTCNowMyDocumentsMSecMouseDelayPlayMouseDelayMonMMMMMMMMMMinMDayLoopRegTypeLoopRegTimeModifiedLoopRegSubKeyLoopRegNameLoopRegKeyLoopReadLineLoopFileTimeModifiedLoopFileTimeCreatedLoopFileTimeAccessedLoopFileSizeMBLoopFileSizeKBLoopFileSizeLoopFileShortPathLoopFileShortNameLoopFilePathLoopFileNameLoopFileLongPathLoopFileFullPathLoopFileExtLoopFileDirLoopFileAttribLoopFieldLineNumberLineFileLastErrorLanguageKeyDurationPlayKeyDurationKeyDelayPlayKeyDelayIsUnicodeIsSuspendedIsPausedIsCriticalIsCompiledIsAdminIs64bitOSIPAddress4IPAddress3IPAddress2IPAddress1InitialWorkingDirIndexIconTipIconNumberIconHiddenIconFileHourGuiYGuiXGuiWidthGuiHeightGuiEventGuiControlEventFormatIntegerFormatFloatExitReasonEventInfoEndCharDesktopCommonDesktopDefaultTreeViewDefaultMouseSpeedDefaultListViewDefaultGuiDDDDDDDDDCursorCoordModeToolTipCoordModePixelCoordModeMouseCoordModeMenuCoordModeCaretControlDelayComputerNameCaretYCaretXBatchLinesAppDataCommonAppDataAhkVersionAhkPathTrueProgramFilesFalseComSpecClipboardAllClipboard...%s[%Iu of %Iu]: %-1.60s%sPropertyRegExMatch\:\:REG_SZREG_EXPAND_SZREG_MULTI_SZREG_DWORDREG_BINARYDefault3264LineRegExFASTSLOWAscChrDerefHTMLModPowExpSqrtLogLnRoundCeilFloorAbsSinCosTanASinACosATanBitAndBitOrBitXOrBitNotBitShiftLeftBitShiftRightAddDestroyNamePriorityInterruptNoTimersLabelTypeCountLocalePermitMouseSendAndMouseMouseMoveOffPlayEventThenEventThenPlayYESNOOKCANCELABORTIGNORERETRYCONTINUETRYAGAINMINMAXHIDEScreenRelativeWindowClientPixelCaretIntegerFloatNumberTimeDateDigitXdigitAlnumAlphaUpperLowerUTF-8UTF-8-RAWUTF-16UTF-16-RAWCPFuncRemoveClipboardFormatListeneruser32AddClipboardFormatListenerTrayNo tray memA_Clipboardstatus AHK_PlayMe modeclose AHK_PlayMeRegClassAutoHotkey2Shell_TrayWndCreateWindoweditConsolasLucida Console*ErrorLevel <>=/|^,:*&~!()[]{}+-?."'\;`IFWHILEClass>AUTOHOTKEY SCRIPT<Could not extract script from EXE./*#CommentFlag*/and<>=/|^,:<>=/|^,:.+-*&!?~::?*- Continuation section too long.JoinLTrimRTrimMissing ")"Functions cannot contain functions.Missing "{"Not a valid method, class or property definition.GetSetNot a valid property getter/setter.Hotke
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Program Manager
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >Program Manager
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowDwmGetWindowAttributedwmapi.dllahk_idpidgroup%s%uProgram ManagerProgmanWorkerWError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400D4140 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00000001400D4140
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400693F0 GetComputerNameW,GetUserNameW,0_2_00000001400693F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_00000001400CF0E4 HeapCreate,GetVersion,HeapSetInformation,0_2_00000001400CF0E4
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: WIN_XP
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: WIN_VISTA
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: WIN_7
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: WIN_8
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle\AutoHotkey.exeWIN32_NTWIN_8.1WIN_8WIN_7WIN_VISTAWIN_XPWIN_2003%04hX0x%Ix*pPIntStrPtrShortInt64DoubleAStrWStrgdi32comctl32kernel32W-3-4CDecl-2This DllCall requires a prior VarSetCapacity.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fFfSelectVisCenterUniDescLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfo
Source: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeBinary or memory string: WIN_8.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001E990 Shell_NotifyIconW,RemoveClipboardFormatListener,ChangeClipboardChain,DestroyWindow,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,free,free,free,0_2_000000014001E990
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_000000014001F420 AddClipboardFormatListener,PostMessageW,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,0_2_000000014001F420
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exeCode function: 0_2_0000000140073930 RemoveClipboardFormatListener,ChangeClipboardChain,0_2_0000000140073930
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
31
Input Capture
11
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol1
Screen Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin Shares31
Input Capture
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object Model3
Clipboard Data
1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Access Token Manipulation
LSA Secrets16
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Process Injection
Cached Domain Credentials131
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe3%ReversingLabs
SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
weather.yahooapis.com
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://weather.yahooapis.com/forecastrss?w=693838&u=c4.amsi.csvSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2439550147.000000000014C000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://weather.yahooapis.com/forecastrss?w=693838&u=cXSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3038109100.000000000014C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://soowim.tistory.com/303SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exefalse
          unknown
          http://weather.yahooapis.com/forecastrss?w=&u=SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002950000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://autohotkey.comSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exefalse
              unknown
              https://soowim.tistory.com/303CSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3071183036.0000000002950000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://weather.yahooapis.com/forecastrss?w=693838&u=cSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2697255287.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2719249473.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2628389658.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2646483608.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2341924681.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2214027953.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2157956565.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2395587454.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2428639237.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2294387085.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2352606610.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2305184919.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2840198841.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000002.3070754339.000000000014D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2817203305.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2363494558.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3027442002.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2519051558.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2417946215.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2461119307.000000000014C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.2136474486.000000000014C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://weather.ySecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe, 00000000.00000003.3038109100.000000000014C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://autohotkey.comCouldSecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exefalse
                      unknown
                      http://weather.yahooapis.com/forecastrss?w=SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exefalse
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1521516
                        Start date and time:2024-09-28 20:35:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 48s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
                        Detection:MAL
                        Classification:mal52.evad.winEXE@1/0@4/0
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 251
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        • VT rate limit hit for: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
                        TimeTypeDescription
                        14:36:13API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.146890494592352
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
                        File size:1'417'216 bytes
                        MD5:2e440604cac15e233d3832e00251592e
                        SHA1:50df05d9f86c9383ca5e6adef0df4b89089bca04
                        SHA256:7e57e8caddb50f98bd8b3f17fb9fd21372cc32b0147d5e3853f043745e204a41
                        SHA512:33a737f4aca31cdfb241948c0af5080105f72506490eba2d6ab75728cffc11eeab4450581dbd52734183b22303392ed4f6272b46b51ff264e49914ad492ba806
                        SSDEEP:24576:hUNxvqF6FGYJf6yjNQpNONZNlTX5PlGPgquLEIWxUc7N11QaSYx7GqOsWH6UbAh:hUNxvC6FGYJf6yjNQpNONZnTX5PlGPgG
                        TLSH:15659D0733A6C0E8DF6790F2CA255223D77278111B289BDB64E06E2DDFA3E915B36711
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........C...C...C...XTX.v...XTY.....J.p.D...J.t.B...J.`.^...C.......XTm.T...XT\.h...XTi.B...XTn.B...RichC...........PE..d....6.e...
                        Icon Hash:0e1f3f3f3d99993f
                        Entrypoint:0x1400cdb30
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:
                        Time Stamp:0x65F53619 [Sat Mar 16 06:03:05 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:2
                        File Version Major:5
                        File Version Minor:2
                        Subsystem Version Major:5
                        Subsystem Version Minor:2
                        Import Hash:a649e6750bcf2911044dec744c57f40f
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007FDE0915138Ch
                        dec eax
                        add esp, 28h
                        jmp 00007FDE0914ABD7h
                        int3
                        int3
                        dec eax
                        mov dword ptr [esp+08h], ebx
                        dec eax
                        mov dword ptr [esp+10h], ebp
                        dec eax
                        mov dword ptr [esp+18h], esi
                        push edi
                        dec eax
                        sub esp, 20h
                        dec eax
                        lea ebx, dword ptr [ecx+1Ch]
                        dec eax
                        mov ebp, ecx
                        mov esi, 00000101h
                        dec eax
                        mov ecx, ebx
                        inc esp
                        mov eax, esi
                        xor edx, edx
                        call 00007FDE0914D9E4h
                        inc ebp
                        xor ebx, ebx
                        dec eax
                        lea edi, dword ptr [ebp+10h]
                        inc ecx
                        lea ecx, dword ptr [ebx+06h]
                        inc ecx
                        movzx eax, bx
                        inc esp
                        mov dword ptr [ebp+0Ch], ebx
                        dec esp
                        mov dword ptr [ebp+04h], ebx
                        rep stosw
                        dec eax
                        lea edi, dword ptr [000444EEh]
                        dec eax
                        sub edi, ebp
                        mov al, byte ptr [edi+ebx]
                        mov byte ptr [ebx], al
                        dec eax
                        inc ebx
                        dec eax
                        dec esi
                        jne 00007FDE0914AD75h
                        dec eax
                        lea ecx, dword ptr [ebp+0000011Dh]
                        mov edx, 00000100h
                        mov al, byte ptr [ecx+edi]
                        mov byte ptr [ecx], al
                        dec eax
                        inc ecx
                        dec eax
                        dec edx
                        jne 00007FDE0914AD75h
                        dec eax
                        mov ebx, dword ptr [esp+30h]
                        dec eax
                        mov ebp, dword ptr [esp+38h]
                        dec eax
                        mov esi, dword ptr [esp+40h]
                        dec eax
                        add esp, 20h
                        pop edi
                        ret
                        dec eax
                        mov eax, esp
                        dec eax
                        mov dword ptr [eax+10h], ebx
                        dec eax
                        mov dword ptr [eax+18h], esi
                        dec eax
                        mov dword ptr [eax+20h], edi
                        push ebp
                        dec eax
                        lea ebp, dword ptr [eax-00000488h]
                        dec eax
                        sub esp, 00000580h
                        dec eax
                        mov eax, dword ptr [0004529Bh]
                        dec eax
                        xor eax, esp
                        Programming Language:
                        • [C++] VS2010 SP1 build 40219
                        • [ C ] VS2010 SP1 build 40219
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2010 SP1 build 40219
                        • [RES] VS2010 SP1 build 40219
                        • [LNK] VS2010 SP1 build 40219
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x10e39c0x12c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1310000x34110.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x11f0000x7a58.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xe00000xeb8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xde3e60xde4001b1d6dd14717b7a4a86bc608450d2229False0.5378805188413949data6.547530261634082IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xe00000x312fe0x3140009069cfe30350895756a1046ae0bd101False0.28075428299492383data4.968893111667075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1120000xc3b80x5000969162fa5a35d1af3366239c5d31d147False0.25data3.3115656660148853IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x11f0000x7a580x7c00ee1089d1b53300da83162d138f4a39ccFalse0.4783581149193548data5.987995779242859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        text0x1270000x258d0x26006cae918481287a7ff0aaef42fc0b95eeFalse0.46484375data5.774323838239317IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE
                        data0x12a0000x6ec00x70008f4275b626558a8640120f611553e570False0.47119140625data6.457359279664662IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x1310000x341100x342007671f68b0f97034b8064be445156059cFalse0.25184071492805754data3.524559487634412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x1313f80x2e428Device independent bitmap graphic, 179 x 512 x 32, image size 183296EnglishUnited States0.23747097318978255
                        RT_ICON0x15f8200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6941489361702128
                        RT_ICON0x15fc880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6622340425531915
                        RT_ICON0x1600f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6453900709219859
                        RT_ICON0x1605580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.6655405405405406
                        RT_MENU0x1606800x2c8dataEnglishUnited States0.46207865168539325
                        RT_DIALOG0x1609480xe8dataEnglishUnited States0.6206896551724138
                        RT_ACCELERATOR0x160a300x48dataEnglishUnited States0.8194444444444444
                        RT_RCDATA0x160a780x3f22Unicode text, UTF-8 textEnglishUnited States0.2761415666377924
                        RT_GROUP_ICON0x16499c0x14dataEnglishUnited States1.2
                        RT_GROUP_ICON0x1649b00x14dataEnglishUnited States1.25
                        RT_GROUP_ICON0x1649c40x14dataEnglishUnited States1.25
                        RT_GROUP_ICON0x1649d80x14dataEnglishUnited States1.25
                        RT_GROUP_ICON0x1649ec0x14dataEnglishUnited States1.25
                        RT_VERSION0x164a000x21cdataEnglishUnited States0.4925925925925926
                        RT_MANIFEST0x164c1c0x4f4ASCII text, with very long lines (1268), with no line terminatorsEnglishUnited States0.4755520504731861
                        DLLImport
                        WSOCK32.dllgethostbyname, inet_addr, WSACleanup, gethostname, WSAStartup
                        WINMM.dllmixerGetLineInfoW, mixerGetDevCapsW, mixerOpen, mciSendStringW, joyGetPosEx, mixerGetLineControlsW, mixerGetControlDetailsW, mixerSetControlDetails, waveOutGetVolume, mixerClose, waveOutSetVolume, joyGetDevCapsW
                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                        COMCTL32.dllImageList_Create, CreateStatusWindowW, ImageList_ReplaceIcon, ImageList_GetIconSize, ImageList_Destroy, ImageList_AddMasked
                        PSAPI.DLLGetProcessImageFileNameW, GetModuleBaseNameW, GetModuleFileNameExW
                        WININET.dllInternetOpenW, InternetOpenUrlW, InternetCloseHandle, InternetReadFileExA, InternetReadFile
                        KERNEL32.dllGetModuleFileNameW, GetSystemTimeAsFileTime, FindResourceW, SizeofResource, LoadResource, LockResource, GetFullPathNameW, GetShortPathNameW, FindFirstFileW, FindNextFileW, FindClose, FileTimeToLocalFileTime, SetEnvironmentVariableW, Beep, MoveFileW, OutputDebugStringW, CreateProcessW, GetFileAttributesW, WideCharToMultiByte, MultiByteToWideChar, GetExitCodeProcess, WriteProcessMemory, ReadProcessMemory, GetCurrentProcessId, OpenProcess, TerminateProcess, SetPriorityClass, SetLastError, GetEnvironmentVariableW, GetLocalTime, GetDateFormatW, GetTimeFormatW, GetDiskFreeSpaceExW, SetVolumeLabelW, CreateFileW, DeviceIoControl, GetDriveTypeW, GetVolumeInformationW, GetDiskFreeSpaceW, GetCurrentDirectoryW, CreateDirectoryW, ReadFile, WriteFile, DeleteFileW, SetFileAttributesW, LocalFileTimeToFileTime, SetFileTime, DeleteCriticalSection, GetSystemTime, GetSystemDefaultUILanguage, GetComputerNameW, GetSystemWindowsDirectoryW, GetTempPathW, EnterCriticalSection, LeaveCriticalSection, VirtualProtect, QueryDosDeviceW, CompareStringW, RemoveDirectoryW, CopyFileW, GetCurrentProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetPrivateProfileStringW, GetPrivateProfileSectionW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, WritePrivateProfileSectionW, SetEndOfFile, GetACP, GetFileType, GetStdHandle, SetFilePointerEx, SystemTimeToFileTime, FileTimeToSystemTime, GetFileSize, IsWow64Process, VirtualAllocEx, VirtualFreeEx, EnumResourceNamesW, LoadLibraryExW, GlobalSize, HeapReAlloc, EncodePointer, HeapFree, DecodePointer, ExitProcess, HeapAlloc, IsValidCodePage, FlsGetValue, FlsSetValue, FlsFree, FlsAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, InitializeCriticalSection, GetCPInfo, GetVersionExW, GetModuleHandleW, FreeLibrary, GetProcAddress, LoadLibraryW, GetLastError, CreateMutexW, CloseHandle, GetExitCodeThread, SetThreadPriority, CreateThread, GetStringTypeExW, lstrcmpiW, GetCurrentThreadId, GlobalUnlock, GlobalFree, GlobalAlloc, GlobalLock, SetErrorMode, SetCurrentDirectoryW, Sleep, GetTickCount, MulDiv, RtlCaptureContext, HeapSetInformation, GetVersion, HeapCreate, InitializeCriticalSectionAndSpinCount, HeapSize, HeapQueryInformation, GetCommandLineW, GetStartupInfoW, RtlUnwindEx, GetStringTypeW, RaiseException, RtlPcToFileHeader, LCMapStringW, GetConsoleCP, GetConsoleMode, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, QueryPerformanceCounter, GetOEMCP, SetFilePointer, WriteConsoleW, SetStdHandle, FlushFileBuffers, GetFileSizeEx, GetProcessHeap
                        USER32.dllGetDlgItem, SetDlgItemTextW, MessageBeep, GetCursorInfo, GetLastInputInfo, GetSystemMenu, GetMenuItemCount, GetMenuItemID, GetSubMenu, GetMenuStringW, ExitWindowsEx, SetMenu, FlashWindow, GetPropW, SetPropW, RemovePropW, MapWindowPoints, RedrawWindow, SetWindowLongPtrW, SetParent, GetClassInfoExW, DefDlgProcW, GetAncestor, UpdateWindow, GetMessagePos, GetClassLongPtrW, CallWindowProcW, CheckRadioButton, IntersectRect, GetUpdateRect, PtInRect, CreateDialogIndirectParamW, GetWindowLongPtrW, CreateAcceleratorTableW, DestroyAcceleratorTable, InsertMenuItemW, SetMenuDefaultItem, RemoveMenu, SetMenuItemInfoW, IsMenu, GetMenuItemInfoW, CreateMenu, CreatePopupMenu, SetMenuInfo, AppendMenuW, DestroyMenu, TrackPopupMenuEx, CopyImage, CreateIconIndirect, CreateIconFromResourceEx, EnumClipboardFormats, GetWindow, BringWindowToTop, MessageBoxW, GetTopWindow, GetQueueStatus, SendDlgItemMessageW, SetClipboardViewer, LoadAcceleratorsW, EnableMenuItem, GetMenu, CreateWindowExW, RegisterClassExW, LoadCursorW, DestroyWindow, EnableWindow, MapVirtualKeyW, VkKeyScanExW, MapVirtualKeyExW, GetKeyboardLayoutNameW, ActivateKeyboardLayout, GetGUIThreadInfo, GetWindowTextW, mouse_event, WindowFromPoint, GetSystemMetrics, keybd_event, SetKeyboardState, GetKeyboardState, GetCursorPos, GetAsyncKeyState, AttachThreadInput, SendInput, UnregisterHotKey, RegisterHotKey, SendMessageTimeoutW, UnhookWindowsHookEx, SetWindowsHookExW, PostThreadMessageW, IsCharAlphaNumericW, IsCharUpperW, IsCharLowerW, ToUnicodeEx, GetKeyboardLayout, CallNextHookEx, CharLowerW, ReleaseDC, GetDC, OpenClipboard, GetClipboardData, GetClipboardFormatNameW, CloseClipboard, SetClipboardData, EmptyClipboard, PostMessageW, FindWindowW, EndDialog, IsWindow, DispatchMessageW, TranslateMessage, ShowWindow, CountClipboardFormats, SetWindowLongW, ScreenToClient, IsDialogMessageW, DialogBoxParamW, SetForegroundWindow, DefWindowProcW, FillRect, DrawIconEx, GetSysColorBrush, GetSysColor, RegisterWindowMessageW, EnumDisplayMonitors, IsIconic, IsZoomed, EnumWindows, ChangeClipboardChain, GetWindowTextLengthW, SendMessageW, IsWindowEnabled, GetWindowLongW, GetKeyState, TranslateAcceleratorW, KillTimer, PeekMessageW, GetFocus, GetClassNameW, GetWindowThreadProcessId, GetForegroundWindow, InvalidateRect, SetLayeredWindowAttributes, SetWindowPos, SetWindowRgn, SetFocus, SetActiveWindow, ClientToScreen, EnumChildWindows, MoveWindow, GetWindowRect, GetMonitorInfoW, MonitorFromPoint, GetClientRect, SystemParametersInfoW, AdjustWindowRectEx, DrawTextW, SetRect, GetIconInfo, SetWindowTextW, IsWindowVisible, BlockInput, GetMessageW, SetTimer, GetParent, GetDlgCtrlID, CharUpperW, IsClipboardFormatAvailable, CheckMenuItem, PostQuitMessage, IsCharAlphaW, LoadImageW, DestroyIcon
                        GDI32.dllGetPixel, GetClipRgn, GetCharABCWidthsW, SetBkMode, CreatePatternBrush, SetBrushOrgEx, EnumFontFamiliesExW, CreateDIBSection, GdiFlush, SetBkColor, ExcludeClipRect, SetTextColor, GetClipBox, BitBlt, CreateCompatibleBitmap, GetSystemPaletteEntries, GetDIBits, CreateCompatibleDC, CreatePolygonRgn, CreateRectRgn, CreateRoundRectRgn, CreateEllipticRgn, DeleteDC, GetObjectW, GetTextMetricsW, GetTextFaceW, SelectObject, GetStockObject, CreateDCW, CreateSolidBrush, CreateFontW, FillRgn, GetDeviceCaps, DeleteObject
                        COMDLG32.dllCommDlgExtendedError, GetSaveFileNameW, GetOpenFileNameW
                        ADVAPI32.dllRegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, GetUserNameW, RegEnumKeyExW, RegEnumValueW, RegQueryInfoKeyW, RegOpenKeyExW, RegCloseKey, RegConnectRegistryW, RegDeleteValueW
                        SHELL32.dllDragQueryPoint, SHEmptyRecycleBinW, SHFileOperationW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetDesktopFolder, SHGetMalloc, SHGetFolderPathW, ShellExecuteExW, Shell_NotifyIconW, DragFinish, DragQueryFileW, ExtractIconW
                        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, CoInitialize, CoUninitialize, CLSIDFromString, CLSIDFromProgID, CoGetObject, StringFromGUID2, CreateStreamOnHGlobal
                        OLEAUT32.dllSafeArrayGetLBound, GetActiveObject, SysStringLen, OleLoadPicture, SafeArrayUnaccessData, SafeArrayGetElemsize, SafeArrayAccessData, SafeArrayUnlock, SafeArrayPtrOfIndex, SafeArrayLock, SafeArrayGetDim, SafeArrayDestroy, SafeArrayGetUBound, VariantCopyInd, SafeArrayCopy, SysAllocString, VariantChangeType, VariantClear, SafeArrayCreate, SysFreeString
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 28, 2024 20:36:15.954535961 CEST5584953192.168.2.41.1.1.1
                        Sep 28, 2024 20:36:15.963118076 CEST53558491.1.1.1192.168.2.4
                        Sep 28, 2024 20:37:15.959297895 CEST6545653192.168.2.41.1.1.1
                        Sep 28, 2024 20:37:15.968528986 CEST53654561.1.1.1192.168.2.4
                        Sep 28, 2024 20:38:15.942802906 CEST5215853192.168.2.41.1.1.1
                        Sep 28, 2024 20:38:15.950531960 CEST53521581.1.1.1192.168.2.4
                        Sep 28, 2024 20:38:20.020756960 CEST5998953192.168.2.41.1.1.1
                        Sep 28, 2024 20:38:20.029335976 CEST53599891.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Sep 28, 2024 20:36:15.954535961 CEST192.168.2.41.1.1.10xf77dStandard query (0)weather.yahooapis.comA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:37:15.959297895 CEST192.168.2.41.1.1.10x7fa3Standard query (0)weather.yahooapis.comA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:38:15.942802906 CEST192.168.2.41.1.1.10xbd3fStandard query (0)weather.yahooapis.comA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:38:20.020756960 CEST192.168.2.41.1.1.10x96e6Standard query (0)weather.yahooapis.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Sep 28, 2024 20:36:15.963118076 CEST1.1.1.1192.168.2.40xf77dName error (3)weather.yahooapis.comnonenoneA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:37:15.968528986 CEST1.1.1.1192.168.2.40x7fa3Name error (3)weather.yahooapis.comnonenoneA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:38:15.950531960 CEST1.1.1.1192.168.2.40xbd3fName error (3)weather.yahooapis.comnonenoneA (IP address)IN (0x0001)false
                        Sep 28, 2024 20:38:20.029335976 CEST1.1.1.1192.168.2.40x96e6Name error (3)weather.yahooapis.comnonenoneA (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:14:36:13
                        Start date:28/09/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.AHK.13140.16708.exe"
                        Imagebase:0x140000000
                        File size:1'417'216 bytes
                        MD5 hash:2E440604CAC15E233D3832E00251592E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:1.2%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:29.4%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:77
                          execution_graph 242464 1400330a4 242505 14003c120 242464->242505 242466 140032611 GetTickCount 242467 140032630 PeekMessageW 242466->242467 242471 1400325d7 242466->242471 242470 140032659 GetTickCount 242467->242470 242467->242471 242468 1400325ea GlobalUnlock 242469 1400325fe CloseClipboard 242468->242469 242469->242466 242470->242471 242471->242466 242471->242468 242471->242469 242471->242470 242472 140032721 GetTickCount 242471->242472 242474 140032530 241 API calls 242471->242474 242475 140038ad5 242471->242475 242476 14008a1c0 242471->242476 242472->242471 242474->242471 242477 14008a1f1 __initmbctable 242476->242477 242478 14008a1e8 242476->242478 242480 14008a22d 242477->242480 242482 14008a1fa 242477->242482 242485 14008a253 242477->242485 242622 14008a6d0 121 API calls 242478->242622 242623 140040410 94 API calls _wcsupr_s_l 242480->242623 242482->242471 242483 14008a246 242483->242471 242484 14008a29b 242533 1400ca9c4 242484->242533 242485->242484 242487 1400cb13c free 62 API calls 242485->242487 242504 14008a2ea 242485->242504 242487->242484 242489 14008a2c2 242624 140040410 94 API calls _wcsupr_s_l 242489->242624 242491 14008a629 242495 14008a2e5 242491->242495 242497 14008a661 GetTickCount 242491->242497 242492 14008a352 242492->242491 242616 1400cb13c 242492->242616 242493 14008a54a 242493->242492 242628 140001820 116 API calls 242493->242628 242495->242471 242500 14008a680 SetTimer 242497->242500 242501 14008a677 242497->242501 242500->242495 242501->242495 242501->242500 242504->242492 242504->242493 242550 1400869b0 242504->242550 242625 14008abc0 117 API calls __initmbctable 242504->242625 242626 14008aa30 119 API calls 242504->242626 242627 1400b1950 116 API calls __initmbctable 242504->242627 242999 1400896a0 242505->242999 242507 14003c1ad 242508 14003c1ca 242507->242508 242510 1400cb13c free 62 API calls 242507->242510 242509 14003c2a0 242508->242509 242530 1400846b0 159 API calls 242508->242530 242509->242471 242510->242508 242511 14003c26e 242512 1400cb13c free 62 API calls 242511->242512 242513 14003c288 242511->242513 242512->242513 242513->242509 243011 1400a6bf0 242513->243011 242514 14003c330 242515 1400780e0 65 API calls 242514->242515 242518 1400cb13c free 62 API calls 242514->242518 242521 140032530 241 API calls 242514->242521 242525 14003c59c 242514->242525 242526 14003c5be 242514->242526 242532 1400a6bf0 152 API calls 242514->242532 243020 140001820 116 API calls 242514->243020 243021 1400cc6f4 63 API calls 6 library calls 242514->243021 243022 14001c250 119 API calls _wcstoi64 242514->243022 243023 140014880 65 API calls 242514->243023 243024 1400cc690 63 API calls _wcstoi64 242514->243024 243025 1400cbb98 63 API calls _wcstoi64 242514->243025 243026 14001c1b0 119 API calls _wcstoi64 242514->243026 242515->242514 242518->242514 242521->242514 242531 140013980 SafeArrayDestroy 242525->242531 242526->242514 242528 14003c63b 242526->242528 243027 14003c060 242 API calls 242526->243027 242528->242525 242530->242511 242531->242509 242532->242514 242534 1400caa58 242533->242534 242540 1400ca9dc 242533->242540 242535 1400cf144 _callnewh DecodePointer 242534->242535 242537 1400caa5d 242535->242537 242536 1400caa14 HeapAlloc 242536->242540 242541 14008a2b3 242536->242541 242636 1400ced8c 62 API calls _getptd 242537->242636 242540->242536 242542 1400caa3d 242540->242542 242546 1400caa42 242540->242546 242549 1400ca9f4 242540->242549 242632 1400cf144 DecodePointer 242540->242632 242541->242489 242541->242504 242634 1400ced8c 62 API calls _getptd 242542->242634 242635 1400ced8c 62 API calls _getptd 242546->242635 242549->242536 242629 1400cf0a0 62 API calls 2 library calls 242549->242629 242630 1400cee40 62 API calls 4 library calls 242549->242630 242631 1400cac68 GetModuleHandleW GetProcAddress ExitProcess malloc 242549->242631 242613 1400869d9 _wcsupr_s_l __initmbctable 242550->242613 242551 140088d66 242552 140088d82 242551->242552 242553 140089102 242551->242553 242554 140088c83 __initmbctable 242551->242554 242552->242554 242713 1400b07e0 94 API calls 3 library calls 242552->242713 242553->242554 242556 140089145 242553->242556 242557 140089128 242553->242557 242559 1400cb13c free 62 API calls 242554->242559 242563 140088df8 242554->242563 242565 140089184 242556->242565 242566 140089174 242556->242566 242714 1400b1500 94 API calls 3 library calls 242557->242714 242559->242554 242562 1400879b9 242562->242504 242563->242504 242564 140088d14 242564->242554 242569 1400b2040 63 API calls 242564->242569 242565->242554 242571 1400891aa 242565->242571 242572 14008921c 242565->242572 242715 140006090 21 API calls 2 library calls 242566->242715 242567 1400780e0 65 API calls 242567->242613 242569->242554 242570 140005e70 81 API calls 242570->242613 242571->242554 242588 1400cb13c free 62 API calls 242571->242588 242572->242554 242584 140089271 242572->242584 242589 140089251 242572->242589 242575 140086f96 GetEnvironmentVariableW 242575->242613 242576 140001820 116 API calls 242576->242613 242577 140088c88 242583 140088c9a 242577->242583 242585 1400cb13c free 62 API calls 242577->242585 242579 1400b1950 116 API calls 242579->242613 242580 140088c66 242701 140040410 94 API calls _wcsupr_s_l 242580->242701 242581 140086c5c GetEnvironmentVariableW 242581->242613 242583->242554 242702 1400b2040 242583->242702 242594 1400aa420 73 API calls 242584->242594 242585->242583 242587 140088cdb 242711 140040410 94 API calls _wcsupr_s_l 242587->242711 242588->242554 242589->242554 242590 140089388 242589->242590 242597 1400cb13c free 62 API calls 242589->242597 242590->242554 242600 1400ca9c4 malloc 62 API calls 242590->242600 242591 1400b1d60 98 API calls 242591->242613 242593 140078530 89 API calls 242593->242613 242594->242554 242595 140088cba 242595->242554 242602 1400b2040 63 API calls 242595->242602 242596 1400cbb98 63 API calls 242596->242613 242597->242590 242599 1400788a0 95 API calls 242599->242613 242600->242554 242601 1400cbe84 65 API calls 242601->242613 242602->242554 242603 140088cf4 242712 140040410 94 API calls _wcsupr_s_l 242603->242712 242604 1400783d0 65 API calls 242604->242613 242605 1400b2040 63 API calls 242605->242613 242607 1400cc690 63 API calls _wcstoi64 242607->242613 242608 1400ca9c4 62 API calls malloc 242608->242613 242609 140078470 66 API calls 242609->242613 242613->242551 242613->242553 242613->242554 242613->242562 242613->242564 242613->242567 242613->242570 242613->242575 242613->242576 242613->242577 242613->242579 242613->242580 242613->242581 242613->242583 242613->242587 242613->242591 242613->242593 242613->242595 242613->242596 242613->242599 242613->242601 242613->242603 242613->242604 242613->242605 242613->242607 242613->242608 242613->242609 242615 1400cb13c free 62 API calls 242613->242615 242637 140089890 242613->242637 242672 14002e2a0 242613->242672 242688 140078900 118 API calls 242613->242688 242689 1400b1500 94 API calls 3 library calls 242613->242689 242690 140006090 21 API calls 2 library calls 242613->242690 242691 1400b1bb0 62 API calls free 242613->242691 242692 1400aa420 242613->242692 242698 1400b07e0 94 API calls 3 library calls 242613->242698 242699 1400cc6f4 63 API calls 6 library calls 242613->242699 242700 14001c250 119 API calls _wcstoi64 242613->242700 242615->242613 242617 1400cb171 free 242616->242617 242618 1400cb141 RtlFreeHeap 242616->242618 242617->242491 242618->242617 242619 1400cb15c 242618->242619 242998 1400ced8c 62 API calls _getptd 242619->242998 242621 1400cb161 GetLastError 242621->242617 242622->242477 242623->242483 242624->242495 242625->242504 242626->242504 242627->242504 242628->242493 242629->242549 242630->242549 242633 1400cf15f 242632->242633 242633->242540 242634->242546 242635->242541 242636->242541 242649 1400898fb 242637->242649 242660 14008999e _wcsupr_s_l 242637->242660 242638 140089aad 242716 14006bfb0 242638->242716 242775 1400825b0 242638->242775 242785 1400a8270 242638->242785 242639 140089b5c 242666 140089b7e __initmbctable 242639->242666 242815 1400b1e90 62 API calls malloc 242639->242815 242641 14008a02a 242642 14008a0e0 242641->242642 242645 14008a059 242641->242645 242646 14008a047 242641->242646 242801 140032530 242642->242801 242644 140089938 242813 1400daa58 64 API calls __SehTransFilter 242644->242813 242821 1400cbd60 242645->242821 242820 1400a38b0 73 API calls 3 library calls 242646->242820 242649->242644 242812 1400412f0 95 API calls 242649->242812 242651 14008a054 242652 140089a78 242651->242652 242658 14008a0c8 242651->242658 242833 1400a5300 119 API calls 2 library calls 242651->242833 242652->242613 242654 140089ae6 242654->242639 242654->242666 242814 14001c320 116 API calls 242654->242814 242657 1400b07e0 94 API calls 242657->242666 242834 1400b1880 242658->242834 242660->242638 242660->242652 242660->242654 242665 1400aa420 73 API calls 242665->242666 242666->242641 242666->242652 242666->242657 242666->242665 242667 1400cb13c free 62 API calls 242666->242667 242668 1400ca9c4 malloc 62 API calls 242666->242668 242816 14001c6e0 120 API calls 242666->242816 242817 1400b1500 94 API calls 3 library calls 242666->242817 242818 140006090 21 API calls 2 library calls 242666->242818 242819 1400b1bb0 62 API calls free 242666->242819 242667->242666 242668->242666 242674 14002e2d5 wcsncpy 242672->242674 242686 14002e2c9 242672->242686 242673 1400ca93c 62 API calls 242673->242674 242674->242673 242675 14002e3a9 242674->242675 242674->242686 242676 1400ca93c 62 API calls 242675->242676 242677 14002e424 242675->242677 242675->242686 242676->242675 242678 14002e474 242677->242678 242679 14002e4b0 242677->242679 242677->242686 242680 14002e2a0 62 API calls 242678->242680 242681 14002e4ce 242679->242681 242687 14002e4f9 242679->242687 242680->242686 242683 14002e2a0 62 API calls 242681->242683 242682 14002e52e 242684 14002e2a0 62 API calls 242682->242684 242682->242686 242683->242686 242684->242686 242685 1400ca93c 62 API calls 242685->242687 242686->242613 242687->242682 242687->242685 242687->242686 242688->242613 242689->242613 242690->242613 242691->242613 242693 1400aa435 242692->242693 242697 1400aa462 242692->242697 242694 1400aa444 242693->242694 242973 1400aa4b0 242693->242973 242696 1400aa4b0 73 API calls 242694->242696 242694->242697 242696->242697 242697->242613 242698->242613 242699->242613 242700->242613 242701->242554 242703 1400b207f 242702->242703 242704 1400b20f4 242702->242704 242703->242704 242708 1400cb13c free 62 API calls 242703->242708 242978 140013980 242703->242978 242705 1400b2172 242704->242705 242709 1400cb13c free 62 API calls 242704->242709 242705->242705 242706 1400cb13c free 62 API calls 242705->242706 242707 1400b21fd 242705->242707 242706->242707 242707->242554 242708->242703 242709->242704 242711->242595 242712->242595 242713->242554 242714->242554 242715->242554 242717 14006c008 242716->242717 242722 14006c035 242716->242722 242718 14006c063 242717->242718 242720 14006c014 242717->242720 242721 14006c04b 242717->242721 242717->242722 242865 1400780e0 242718->242865 242720->242718 242725 14006c019 242720->242725 242864 14003fe10 94 API calls 3 library calls 242721->242864 242731 14006c0cf 242722->242731 242764 14006c0af _wcsupr_s_l _scwprintf 242722->242764 242870 140001820 116 API calls 242722->242870 242724 14006c068 242724->242722 242869 1400783d0 65 API calls 242724->242869 242862 14001c110 119 API calls 242725->242862 242726 14006c05e 242726->242652 242730 14006c023 242730->242722 242863 14001c1b0 119 API calls _wcstoi64 242730->242863 242871 1400cab94 64 API calls 2 library calls 242731->242871 242733 14006c123 242737 14006c127 242733->242737 242872 1400cab94 64 API calls 2 library calls 242733->242872 242737->242764 242873 14006ba50 62 API calls wcsncpy 242737->242873 242738 14006c5e9 242838 14006b5c0 SetLastError 242738->242838 242739 14006c579 242882 14003fe10 94 API calls 3 library calls 242739->242882 242741 14006c5b1 242884 14006bd40 106 API calls wcsncpy 242741->242884 242743 14006c602 242744 14006c53b 242744->242738 242744->242741 242745 14006c5ac 242744->242745 242745->242741 242883 140001820 116 API calls 242745->242883 242748 14006c5e0 242748->242738 242750 14006cbd2 242748->242750 242750->242726 242753 14006cbdb FreeLibrary 242750->242753 242753->242726 242754 14006c2c8 IsClipboardFormatAvailable 242755 14006c2d7 IsClipboardFormatAvailable 242754->242755 242754->242764 242755->242764 242757 14006c548 242757->242739 242881 1400412f0 95 API calls 242757->242881 242759 1400cbd60 73 API calls 242759->242764 242764->242739 242764->242744 242764->242754 242764->242757 242764->242759 242773 140001820 116 API calls 242764->242773 242874 140005e70 81 API calls 242764->242874 242875 14006ba50 62 API calls wcsncpy 242764->242875 242876 140078470 66 API calls _wcstoi64 242764->242876 242877 140042550 65 API calls 242764->242877 242878 1400783d0 65 API calls 242764->242878 242879 1400aa670 75 API calls 2 library calls 242764->242879 242880 140079a30 73 API calls 2 library calls 242764->242880 242773->242764 242776 1400825e6 CoGetObject 242775->242776 242780 1400825d9 242775->242780 242778 140082622 242776->242778 242782 14008262a 242776->242782 242779 1400cbd60 73 API calls 242778->242779 242779->242782 242780->242776 242896 140001820 116 API calls 242780->242896 242783 140082661 242782->242783 242897 140084160 98 API calls _wcsupr_s_l 242782->242897 242783->242652 242789 1400a82b7 242785->242789 242786 1400a8364 242925 1400a7dc0 241 API calls 242786->242925 242788 1400a82f3 242898 1400846b0 242788->242898 242789->242786 242789->242788 242790 1400a8324 242790->242652 242791 1400a8452 242791->242790 242936 1400412f0 95 API calls 242791->242936 242792 1400a838a 242792->242790 242792->242791 242798 1400a83c8 242792->242798 242926 140001820 116 API calls 242792->242926 242794 1400a8400 242794->242791 242797 1400a8404 242794->242797 242797->242790 242935 1400a7dc0 241 API calls 242797->242935 242927 1400ca93c 242798->242927 242807 1400325ad 242801->242807 242811 140038ad5 242801->242811 242802 140032611 GetTickCount 242803 140032630 PeekMessageW 242802->242803 242802->242807 242806 140032659 GetTickCount 242803->242806 242803->242807 242804 1400325ea GlobalUnlock 242805 1400325fe CloseClipboard 242804->242805 242805->242802 242806->242807 242807->242802 242807->242804 242807->242805 242807->242806 242808 140032721 GetTickCount 242807->242808 242809 14008a1c0 235 API calls 242807->242809 242810 140032530 235 API calls 242807->242810 242807->242811 242808->242807 242809->242807 242810->242807 242811->242652 242812->242644 242813->242660 242814->242654 242815->242666 242816->242666 242817->242666 242818->242666 242819->242666 242820->242651 242823 1400cbd6b 242821->242823 242822 1400ca9c4 malloc 62 API calls 242822->242823 242823->242822 242824 1400cbd84 242823->242824 242825 1400cf144 _callnewh DecodePointer 242823->242825 242828 1400cbd8a 242823->242828 242824->242651 242825->242823 242826 1400cbddb 242955 1400d107c 62 API calls std::exception::operator= 242826->242955 242828->242826 242952 1400cb2cc 242828->242952 242829 1400cbdec 242956 1400d1150 RaiseException __initmbctable 242829->242956 242832 1400cbe02 242833->242658 242835 1400b1896 242834->242835 242836 1400b190d 242835->242836 242837 1400cb13c free 62 API calls 242835->242837 242836->242642 242837->242836 242847 14006b621 _wcsupr_s_l 242838->242847 242840 14006b6b4 GetLastError 242842 14006b717 242840->242842 242843 14006b6e3 _ui64tow 242840->242843 242844 14006b747 242842->242844 242845 14006b726 242842->242845 242892 14003fe10 94 API calls 3 library calls 242843->242892 242849 14006b77f 242844->242849 242850 14006b76f 242844->242850 242893 1400b1500 94 API calls 3 library calls 242845->242893 242891 1400ca590 K32GetProcessMemoryInfo 242847->242891 242852 14006b827 242849->242852 242853 14006b7ba 242849->242853 242859 14006b712 __initmbctable 242849->242859 242894 140006090 21 API calls 2 library calls 242850->242894 242852->242859 242853->242859 242859->242743 242862->242730 242863->242722 242864->242726 242866 140078116 242865->242866 242867 1400780ef 242865->242867 242866->242724 242867->242866 242895 1400cbe84 65 API calls _wcsupr_s_l 242867->242895 242869->242722 242870->242731 242871->242733 242872->242737 242873->242764 242874->242764 242875->242764 242876->242764 242878->242764 242879->242764 242880->242764 242881->242739 242882->242726 242883->242741 242884->242748 242891->242840 242892->242859 242893->242859 242894->242859 242895->242866 242896->242776 242897->242783 242899 140084710 242898->242899 242909 140084747 242898->242909 242903 14008475e 242899->242903 242904 140084730 242899->242904 242899->242909 242900 140084bb6 242901 140084bbb 242900->242901 242902 140084786 242900->242902 242947 140084c20 156 API calls 242901->242947 242948 140084160 98 API calls _wcsupr_s_l 242902->242948 242943 1400840a0 76 API calls 242903->242943 242942 140083f90 120 API calls __initmbctable 242904->242942 242909->242900 242909->242902 242910 1400847b5 242909->242910 242911 14008474e 242909->242911 242917 1400847c1 _wcsupr_s_l 242910->242917 242937 140078530 242910->242937 242911->242790 242913 1400847fc 242913->242917 242923 14008485b SysAllocString 242913->242923 242914 140084b2c 242915 140084b3c 242914->242915 242916 140084b64 242914->242916 242945 140084160 98 API calls _wcsupr_s_l 242915->242945 242916->242911 242946 1400838c0 75 API calls 242916->242946 242918 1400849b2 242917->242918 242944 140083dc0 116 API calls 242917->242944 242918->242914 242920 140084b15 SysFreeString 242918->242920 242920->242918 242924 140084883 SysFreeString 242923->242924 242924->242917 242925->242792 242926->242798 242928 1400ca9b9 242927->242928 242929 1400ca94f 242927->242929 242934 1400ca973 242929->242934 242950 1400ced8c 62 API calls _getptd 242929->242950 242931 1400ca959 242951 1400ced24 17 API calls _invalid_parameter_noinfo 242931->242951 242933 1400ca964 242933->242794 242934->242794 242935->242790 242936->242790 242938 140078552 242937->242938 242939 140078542 242937->242939 242938->242913 242939->242938 242949 1400ad230 89 API calls 242939->242949 242941 1400785a1 242941->242913 242942->242909 242943->242911 242944->242917 242945->242911 242946->242911 242947->242911 242948->242911 242949->242941 242950->242931 242951->242933 242957 1400cb1c0 242952->242957 242955->242829 242956->242832 242972 1400cac80 242957->242972 242974 1400cbd60 73 API calls 242973->242974 242975 1400aa4c0 242974->242975 242976 1400aa4da _RunAllParam 242975->242976 242977 1400ca9c4 malloc 62 API calls 242975->242977 242976->242694 242977->242976 242979 14001398f 242978->242979 242980 140013995 242978->242980 242983 1400138f9 242979->242983 242987 140013942 242979->242987 242980->242703 242984 140013912 242983->242984 242985 140013964 242984->242985 242991 140082300 242984->242991 242985->242980 242988 140013959 242987->242988 242989 140013964 242987->242989 242988->242989 242990 140082300 SafeArrayDestroy 242988->242990 242989->242980 242990->242989 242994 140082270 242991->242994 242993 140082314 _RunAllParam 242993->242985 242996 140082291 _RunAllParam 242994->242996 242995 1400822f8 242995->242993 242996->242995 242997 1400822ee SafeArrayDestroy 242996->242997 242997->242995 242998->242621 243001 1400896d9 242999->243001 243000 1400896e5 243000->242507 243001->243000 243002 140089756 243001->243002 243003 1400897a9 _scwprintf 243001->243003 243005 1400cb13c free 62 API calls 243001->243005 243006 1400ca9c4 malloc 62 API calls 243002->243006 243004 1400869b0 241 API calls 243003->243004 243010 1400897a4 243004->243010 243005->243002 243007 14008977f 243006->243007 243007->243003 243008 140089788 243007->243008 243028 140040410 94 API calls _wcsupr_s_l 243008->243028 243010->242507 243012 1400a6c06 243011->243012 243017 1400a6c16 243011->243017 243012->242514 243013 1400a6c87 243013->242514 243014 1400a6c4b 243016 1400ca93c 62 API calls 243014->243016 243015 1400a6c7b 243015->243013 243029 140085140 243015->243029 243016->243015 243017->243013 243017->243014 243017->243015 243037 140001820 116 API calls 243017->243037 243020->242514 243021->242514 243022->242514 243023->242514 243024->242514 243025->242514 243026->242514 243027->242526 243028->243010 243030 140085184 243029->243030 243031 140085208 243030->243031 243038 140083cc0 102 API calls 243030->243038 243031->243013 243033 1400851b6 243034 1400851e6 243033->243034 243039 140083cc0 102 API calls 243033->243039 243034->243013 243036 1400851d1 243036->243013 243037->243014 243038->243033 243039->243036 243040 14008c661 243047 14008b640 243040->243047 243042 14008c669 243045 14008c66d 243042->243045 243128 14008ff70 243042->243128 243044 14008cba6 243045->243044 243046 1400cb13c free 62 API calls 243045->243046 243046->243044 243048 14008b93b 243047->243048 243049 14008b652 243047->243049 243048->243042 243049->243048 243050 1400ca93c 62 API calls 243049->243050 243051 14008b668 243050->243051 243052 14008b66c 243051->243052 243053 1400ca93c 62 API calls 243051->243053 243052->243042 243054 14008b683 243053->243054 243055 14008b687 243054->243055 243056 1400ca93c 62 API calls 243054->243056 243055->243042 243057 14008b69e 243056->243057 243058 14008b6a2 243057->243058 243059 1400ca93c 62 API calls 243057->243059 243058->243042 243060 14008b6b9 243059->243060 243061 14008b6bd 243060->243061 243062 1400ca93c 62 API calls 243060->243062 243061->243042 243063 14008b6d4 243062->243063 243064 14008b6d8 243063->243064 243065 1400ca93c 62 API calls 243063->243065 243064->243042 243066 14008b6ef 243065->243066 243067 14008b933 243066->243067 243068 1400ca93c 62 API calls 243066->243068 243067->243042 243069 14008b706 243068->243069 243069->243067 243070 1400ca93c 62 API calls 243069->243070 243071 14008b71d 243070->243071 243072 14008b721 243071->243072 243073 1400ca93c 62 API calls 243071->243073 243072->243042 243075 14008b738 243073->243075 243074 14008b73c 243074->243042 243075->243074 243076 1400ca93c 62 API calls 243075->243076 243077 14008b753 243076->243077 243078 14008b757 243077->243078 243079 1400ca93c 62 API calls 243077->243079 243078->243042 243080 14008b76e 243079->243080 243081 14008b772 243080->243081 243082 1400ca93c 62 API calls 243080->243082 243081->243042 243084 14008b789 243082->243084 243083 14008b78d 243083->243042 243084->243083 243085 1400ca93c 62 API calls 243084->243085 243086 14008b7a4 243085->243086 243087 14008b7a8 243086->243087 243088 1400ca93c 62 API calls 243086->243088 243087->243042 243089 14008b7bf 243088->243089 243129 14008ffe8 243128->243129 243133 14008ffc9 243128->243133 243131 140090006 _scwprintf 243129->243131 243356 1400cbba4 65 API calls 4 library calls 243129->243356 243132 14009006c SendMessageW 243131->243132 243131->243133 243134 140090080 243131->243134 243132->243134 243133->243045 243134->243133 243135 14009013c 243134->243135 243136 14009012f 243134->243136 243135->243133 243138 1400901a1 MulDiv 243135->243138 243139 1400901e8 243135->243139 243142 14009023c 243135->243142 243357 14009ea90 11 API calls 243136->243357 243138->243139 243140 1400901f5 MulDiv 243139->243140 243139->243142 243140->243142 243141 14009013a 243141->243135 243295 140094d50 243142->243295 243144 1400903e4 243144->243133 243147 140091286 COMRefPtr 243144->243147 243358 1400ad2a0 89 API calls 243144->243358 243146 140091350 243372 14009e790 6 API calls 243146->243372 243147->243146 243150 140091386 243147->243150 243152 1400913fe 243147->243152 243149 140091362 243149->243150 243150->243152 243153 1400913e5 MulDiv 243150->243153 243151 14009145f 243152->243151 243157 14009164d GetDC SelectObject GetTextMetricsW 243152->243157 243158 140091793 243152->243158 243184 1400917b1 243152->243184 243153->243152 243154 140090690 243170 14009076e __initmbctable 243154->243170 243190 1400907f5 __initmbctable 243154->243190 243359 1400cbba4 65 API calls 4 library calls 243154->243359 243155 140091805 243159 140091920 243155->243159 243160 1400918e5 GetDC SelectObject 243155->243160 243161 14009180f 243155->243161 243156 140091f6c IsWindowVisible 243164 140091f95 IsIconic 243156->243164 243165 140091fa3 243156->243165 243166 1400916f2 243157->243166 243157->243184 243167 140091798 MulDiv 243158->243167 243158->243184 243174 14009194a GetTextMetricsW GetSystemMetrics 243159->243174 243195 140091926 243159->243195 243160->243159 243168 140091d57 MulDiv 243161->243168 243171 140091e66 243161->243171 243164->243165 243189 140091fcb GetPropW 243165->243189 243214 140092054 243165->243214 243167->243184 243169 140091d97 243168->243169 243168->243171 243177 1400907e4 243170->243177 243181 1400907fa __initmbctable 243170->243181 243170->243190 243360 1400cbba4 65 API calls 4 library calls 243170->243360 243171->243156 243179 140091ecc GetTextMetricsW MulDiv 243171->243179 243180 140091e90 GetDC SelectObject 243171->243180 243172 1400907df 243172->243177 243172->243181 243173 14009099a 243176 1400909e5 __initmbctable 243173->243176 243212 1400909ea __initmbctable 243173->243212 243362 1400cbba4 65 API calls 4 library calls 243173->243362 243174->243195 243175 1400cb13c free 62 API calls 243175->243190 243178 140090b8a 243176->243178 243182 140090bd5 __initmbctable 243176->243182 243216 140090bc4 243176->243216 243363 1400cbba4 65 API calls 4 library calls 243176->243363 243177->243190 243201 1400cb13c free 62 API calls 243177->243201 243178->243182 243215 140090bda __initmbctable 243178->243215 243364 1400cbba4 65 API calls 4 library calls 243178->243364 243188 140091f05 GetSystemMetrics 243179->243188 243226 140091f18 243179->243226 243180->243179 243181->243175 243193 140090d7a 243182->243193 243197 140090dc5 __initmbctable 243182->243197 243229 140090db4 243182->243229 243365 1400cbba4 65 API calls 4 library calls 243182->243365 243184->243155 243184->243161 243184->243171 243191 14009182b GetDC SelectObject 243184->243191 243192 140091866 GetTextMetricsW 243184->243192 243186 1400cb13c free 62 API calls 243186->243176 243188->243226 243203 140092019 GetWindowLongW 243189->243203 243204 140091fe0 MapWindowPoints 243189->243204 243190->243173 243190->243176 243208 1400909d4 243190->243208 243361 1400cbba4 65 API calls 4 library calls 243190->243361 243191->243192 243192->243155 243209 14009188b GetSystemMetrics 243192->243209 243193->243197 243231 140090dca __initmbctable 243193->243231 243366 1400cbba4 65 API calls 4 library calls 243193->243366 243194 1400909cf 243194->243208 243194->243212 243196 140091986 GetSystemMetrics GetSystemMetrics 243195->243196 243223 1400919b1 243195->243223 243196->243223 243199 140090f6a 243197->243199 243202 140090fb5 __initmbctable 243197->243202 243236 140090fa4 243197->243236 243367 1400cbba4 65 API calls 4 library calls 243197->243367 243199->243202 243235 140090fba __initmbctable 243199->243235 243368 1400cbba4 65 API calls 4 library calls 243199->243368 243200 140090bbf 243200->243215 243200->243216 243201->243190 243202->243147 243218 14009115a 243202->243218 243241 1400911a5 __initmbctable 243202->243241 243242 140091194 243202->243242 243369 1400cbba4 65 API calls 4 library calls 243202->243369 243203->243214 243217 14009202d SendMessageW 243203->243217 243204->243203 243205 1400cb13c free 62 API calls 243205->243182 243207 14009207c 243208->243176 243233 1400cb13c free 62 API calls 243208->243233 243209->243155 243211 14009126d 243371 14002c4b0 131 API calls wcsncpy 243211->243371 243212->243186 243214->243207 243239 1400938c3 243214->243239 243243 1400938a9 SelectObject 243214->243243 243244 1400938b6 ReleaseDC 243214->243244 243215->243205 243216->243182 243237 1400cb13c free 62 API calls 243216->243237 243217->243214 243228 14009204e 243217->243228 243218->243241 243245 1400911aa __initmbctable 243218->243245 243370 1400cbba4 65 API calls 4 library calls 243218->243370 243219 140090daf 243219->243229 243219->243231 243220 1400cb13c free 62 API calls 243220->243197 243224 140091bda DrawTextW 243223->243224 243286 140091a1f 243223->243286 243249 140091bcf 243224->243249 243225 140090f9f 243225->243235 243225->243236 243226->243156 243228->243214 243229->243197 243246 1400cb13c free 62 API calls 243229->243246 243231->243220 243232 1400ca93c 62 API calls 243232->243241 243233->243176 243234 1400cb13c free 62 API calls 243234->243202 243235->243234 243236->243202 243247 1400cb13c free 62 API calls 243236->243247 243237->243182 243238 1400cb13c free 62 API calls 243238->243241 243239->243133 243248 140093907 243239->243248 243373 1400b0330 94 API calls 4 library calls 243239->243373 243240 14009118f 243240->243242 243240->243245 243241->243147 243241->243211 243241->243232 243242->243241 243253 1400cb13c free 62 API calls 243242->243253 243243->243244 243244->243239 243245->243238 243246->243197 243247->243202 243256 140093915 243248->243256 243261 14009392a 243248->243261 243250 140091c59 GetCharABCWidthsW 243249->243250 243251 140091c4b 243249->243251 243250->243251 243254 140091cd0 243251->243254 243255 140091ca1 MulDiv 243251->243255 243253->243241 243254->243161 243260 140091d1d GetSystemMetrics 243254->243260 243255->243254 243258 140091cc0 GetSystemMetrics 243255->243258 243374 14009db10 7 API calls 243256->243374 243257 140091b9a DrawTextW 243257->243249 243258->243254 243260->243161 243262 140093978 243261->243262 243264 140093980 243261->243264 243375 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 243262->243375 243265 14009398c 243264->243265 243266 1400939c1 243264->243266 243265->243266 243267 140093992 SendMessageW 243265->243267 243268 1400939ca SendMessageW 243266->243268 243269 1400939dd 243266->243269 243267->243266 243268->243269 243376 140097860 8 API calls 243269->243376 243271 1400939f3 243272 140093ac6 243271->243272 243273 140093a0e GetClientRect 243271->243273 243274 140093aad 243271->243274 243277 140093acf GetWindowRect 243272->243277 243285 140093b24 243272->243285 243275 140093a24 243273->243275 243276 140093a47 243273->243276 243274->243272 243377 14009eeb0 8 API calls 243274->243377 243275->243276 243277->243285 243286->243257 243341 140094d7c 243295->243341 243296 1400970d2 243297 1400963fb 243296->243297 243298 1400970eb GetWindowLongW 243296->243298 243297->243144 243299 14009711b 243298->243299 243300 1400972ce 243299->243300 243301 1400972a6 243299->243301 243302 140097276 243299->243302 243303 1400973c1 243300->243303 243307 140097347 SendMessageW 243300->243307 243308 1400972ef 243300->243308 243309 140097314 243300->243309 243301->243300 243305 1400972ab SendMessageW 243301->243305 243302->243305 243306 140097285 SendMessageW 243302->243306 243304 1400973c9 GetWindowLongW 243303->243304 243310 140097440 243304->243310 243311 1400973ef SetLastError SetWindowLongW 243304->243311 243305->243300 243306->243300 243312 140097298 243306->243312 243315 140097381 SetLastError SetWindowLongW 243307->243315 243308->243315 243316 1400972f7 SendMessageW 243308->243316 243309->243307 243318 140097355 243309->243318 243324 14009732a GetWindowRect 243309->243324 243321 14009744d SendMessageW 243310->243321 243327 1400974a9 243310->243327 243319 140097420 GetWindowLongW 243311->243319 243320 140097416 GetLastError 243311->243320 243312->243300 243322 14009739e GetLastError 243315->243322 243323 1400973a8 GetWindowLongW 243315->243323 243316->243315 243318->243307 243318->243315 243319->243310 243320->243310 243320->243319 243325 14009746d SendMessageW SendMessageW 243321->243325 243321->243327 243322->243304 243322->243323 243323->243304 243324->243307 243325->243327 243328 1400975ec SendMessageW 243327->243328 243329 14009761b 243327->243329 243328->243329 243330 140097614 243328->243330 243331 14009762e 243329->243331 243332 140097620 InvalidateRect 243329->243332 243330->243329 243330->243332 243331->243297 243384 14003fad0 94 API calls 3 library calls 243331->243384 243332->243331 243334 1400acc00 SystemTimeToFileTime 243334->243341 243336 1400951b0 EnableWindow 243336->243341 243337 140095228 ShowWindow 243337->243341 243340 1400ca93c 62 API calls 243340->243341 243341->243296 243341->243297 243341->243334 243341->243336 243341->243337 243341->243340 243342 140095818 SendMessageW 243341->243342 243343 140095aa6 243341->243343 243344 140095af0 SendMessageW 243341->243344 243347 1400cab94 64 API calls 243341->243347 243348 14002e2a0 62 API calls 243341->243348 243349 140096059 SendMessageW 243341->243349 243350 140096153 GetClassInfoExW 243341->243350 243351 1400148f0 65 API calls 243341->243351 243352 140096236 GetWindowLongW 243341->243352 243353 1400964a0 GetWindowLongW 243341->243353 243354 1400cbe84 65 API calls 243341->243354 243355 14001bfa0 65 API calls 243341->243355 243378 1400accd0 243341->243378 243382 1400ae690 62 API calls 243341->243382 243383 14002e220 62 API calls 243341->243383 243342->243341 243345 140095acc SendMessageW 243343->243345 243346 140095ab3 SendMessageW 243343->243346 243344->243341 243345->243341 243346->243341 243347->243341 243348->243341 243349->243341 243350->243341 243351->243341 243352->243341 243353->243341 243354->243341 243355->243341 243356->243131 243357->243141 243358->243154 243359->243170 243360->243172 243361->243190 243362->243194 243363->243176 243364->243200 243365->243182 243366->243219 243367->243197 243368->243225 243369->243202 243370->243240 243371->243147 243372->243149 243373->243248 243374->243261 243375->243264 243376->243271 243377->243272 243379 1400acd16 wcsncpy 243378->243379 243380 1400acecb SystemTimeToFileTime 243379->243380 243381 1400acee3 243379->243381 243380->243381 243381->243341 243382->243341 243383->243341 243384->243297 243385 14000bcf0 243386 14000bd00 GetMessageW 243385->243386 243386->243386 243397 14000bd18 243386->243397 243387 14000bd99 UnhookWindowsHookEx 243389 14000bda6 GetLastError 243387->243389 243387->243397 243388 14000bd62 SetWindowsHookExW 243388->243397 243389->243397 243390 14000be10 UnhookWindowsHookEx 243394 14000be1d GetLastError 243390->243394 243390->243397 243392 14000bd54 243399 14000be90 10 API calls _scwprintf 243392->243399 243400 14000be90 10 API calls _scwprintf 243392->243400 243393 14000bde0 SetWindowsHookExW 243393->243397 243394->243397 243395 14000be44 PostThreadMessageW 243395->243397 243397->243386 243397->243387 243397->243388 243397->243390 243397->243392 243397->243393 243397->243395 243398 14000be84 243397->243398 243399->243388 243400->243393 243401 14008d4f9 243402 14008d502 243401->243402 243410 14008d370 243401->243410 243418 1400acc00 243402->243418 243404 14008d50f 243406 14008d519 GetWindowLongW 243404->243406 243407 14008d703 SetWindowTextW 243404->243407 243405 14008d39f 243411 14008d59b 243406->243411 243412 14008d52b 243406->243412 243409 14008d582 GetWindowRect 243407->243409 243407->243410 243408 1400cb13c free 62 API calls 243408->243405 243414 14008da62 MapWindowPoints InvalidateRect 243409->243414 243410->243405 243410->243408 243411->243407 243415 14008d551 SendMessageW 243411->243415 243412->243415 243414->243410 243416 14008d55a 243415->243416 243416->243410 243417 14008d571 IsWindowVisible 243416->243417 243417->243409 243417->243410 243419 1400acc1f 243418->243419 243423 1400acc31 243418->243423 243419->243404 243420 1400acc6c 243421 1400acc9e 243420->243421 243422 1400accd0 SystemTimeToFileTime 243420->243422 243421->243404 243422->243421 243423->243420 243424 1400accd0 SystemTimeToFileTime 243423->243424 243424->243420 243425 1400922b9 CreateWindowExW 243426 14009231e 243425->243426 243427 140093890 243425->243427 243426->243427 243428 14009232a SendMessageW 243426->243428 243429 1400938c3 243427->243429 243430 1400938a9 SelectObject 243427->243430 243431 1400938b6 ReleaseDC 243427->243431 243428->243427 243432 140093907 243429->243432 243435 1400938c9 243429->243435 243470 1400b0330 94 API calls 4 library calls 243429->243470 243430->243431 243431->243429 243434 140093915 243432->243434 243439 14009392a 243432->243439 243471 14009db10 7 API calls 243434->243471 243437 140093978 243472 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 243437->243472 243439->243437 243440 140093980 243439->243440 243441 14009398c 243440->243441 243442 1400939c1 243440->243442 243441->243442 243443 140093992 SendMessageW 243441->243443 243444 1400939ca SendMessageW 243442->243444 243445 1400939dd 243442->243445 243443->243442 243444->243445 243473 140097860 8 API calls 243445->243473 243447 1400939f3 243448 140093ac6 243447->243448 243449 140093a0e GetClientRect 243447->243449 243450 140093aad 243447->243450 243451 140093acf GetWindowRect 243448->243451 243461 140093b24 243448->243461 243452 140093a24 243449->243452 243453 140093a47 243449->243453 243450->243448 243474 14009eeb0 8 API calls 243450->243474 243455 140093afb 243451->243455 243451->243461 243452->243453 243456 140093a28 SetWindowLongW 243452->243456 243454 140093a4a SendMessageW 243453->243454 243457 140093a82 MoveWindow 243454->243457 243458 140093a71 SetWindowLongW 243454->243458 243455->243461 243462 140093b0e SendMessageW 243455->243462 243456->243454 243457->243448 243458->243457 243459 140093ba3 243465 140093baf SetWindowPos 243459->243465 243466 140093bd1 243459->243466 243461->243459 243463 140093b40 GetWindowRect MapWindowPoints InvalidateRect 243461->243463 243464 140093b74 243461->243464 243462->243461 243463->243464 243464->243459 243467 140093b7d SetWindowPos 243464->243467 243465->243466 243468 140093be4 MapWindowPoints 243466->243468 243469 140093c22 243466->243469 243467->243459 243468->243469 243469->243435 243470->243432 243471->243439 243472->243440 243473->243447 243474->243448 243475 14005fb38 243476 14005fb4b 243475->243476 243505 14005fb41 243475->243505 243477 1400ca93c 62 API calls 243476->243477 243479 14005fb5a 243477->243479 243478 14005fbf0 GetDriveTypeW 243478->243505 243480 1400ca93c 62 API calls 243479->243480 243479->243505 243482 14005fb72 243480->243482 243481 14005fc38 243483 14005fc51 243481->243483 243484 14005fc70 243481->243484 243485 1400ca93c 62 API calls 243482->243485 243482->243505 243512 1400b1500 94 API calls 3 library calls 243483->243512 243488 14005fca6 243484->243488 243490 14005fcb8 243484->243490 243487 14005fb8a 243485->243487 243491 1400ca93c 62 API calls 243487->243491 243487->243505 243513 140006090 21 API calls 2 library calls 243488->243513 243497 14005fcef 243490->243497 243501 14005fd03 243490->243501 243509 14005fc6b __initmbctable 243490->243509 243496 14005fba2 243491->243496 243492 1400604d3 243494 14005fedf 243492->243494 243516 1400b1500 94 API calls 3 library calls 243492->243516 243493 14005fed1 243515 14003f1c0 244 API calls 3 library calls 243493->243515 243500 1400ca93c 62 API calls 243496->243500 243496->243505 243514 1400b1bb0 62 API calls free 243497->243514 243502 14005fbba 243500->243502 243503 14005fd60 243501->243503 243508 14005fd40 243501->243508 243501->243509 243504 1400ca93c 62 API calls 243502->243504 243502->243505 243506 1400aa420 73 API calls 243503->243506 243504->243505 243505->243478 243505->243481 243505->243493 243506->243509 243507 14005fe6f 243507->243509 243511 1400ca9c4 malloc 62 API calls 243507->243511 243508->243507 243508->243509 243510 1400cb13c free 62 API calls 243508->243510 243509->243492 243509->243493 243510->243507 243511->243509 243512->243509 243513->243509 243514->243509 243515->243494 243516->243494 243517 1400921bc CreateWindowExW 243518 140092221 243517->243518 243520 140093888 243517->243520 243519 140092232 243518->243519 243518->243520 243521 14009223a GetWindowLongW SendMessageW 243519->243521 243522 14009227b SendMessageW SendMessageW 243519->243522 243523 1400938c3 243520->243523 243524 1400938a9 SelectObject 243520->243524 243525 1400938b6 ReleaseDC 243520->243525 243521->243522 243522->243520 243526 140093907 243523->243526 243529 1400938c9 243523->243529 243564 1400b0330 94 API calls 4 library calls 243523->243564 243524->243525 243525->243523 243528 140093915 243526->243528 243533 14009392a 243526->243533 243565 14009db10 7 API calls 243528->243565 243531 140093978 243566 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 243531->243566 243533->243531 243534 140093980 243533->243534 243535 14009398c 243534->243535 243536 1400939c1 243534->243536 243535->243536 243537 140093992 SendMessageW 243535->243537 243538 1400939ca SendMessageW 243536->243538 243539 1400939dd 243536->243539 243537->243536 243538->243539 243567 140097860 8 API calls 243539->243567 243541 1400939f3 243542 140093ac6 243541->243542 243543 140093a0e GetClientRect 243541->243543 243544 140093aad 243541->243544 243545 140093acf GetWindowRect 243542->243545 243555 140093b24 243542->243555 243546 140093a24 243543->243546 243547 140093a47 243543->243547 243544->243542 243568 14009eeb0 8 API calls 243544->243568 243549 140093afb 243545->243549 243545->243555 243546->243547 243550 140093a28 SetWindowLongW 243546->243550 243548 140093a4a SendMessageW 243547->243548 243551 140093a82 MoveWindow 243548->243551 243552 140093a71 SetWindowLongW 243548->243552 243549->243555 243556 140093b0e SendMessageW 243549->243556 243550->243548 243551->243542 243552->243551 243553 140093ba3 243559 140093baf SetWindowPos 243553->243559 243560 140093bd1 243553->243560 243555->243553 243557 140093b40 GetWindowRect MapWindowPoints InvalidateRect 243555->243557 243558 140093b74 243555->243558 243556->243555 243557->243558 243558->243553 243561 140093b7d SetWindowPos 243558->243561 243559->243560 243562 140093be4 MapWindowPoints 243560->243562 243563 140093c22 243560->243563 243561->243553 243562->243563 243563->243529 243564->243526 243565->243533 243566->243534 243567->243541 243568->243542 243569 140006cb3 243570 140006cc5 243569->243570 243573 140006d40 243570->243573 243574 140006d90 243573->243574 243575 140006dde GetTickCount GetForegroundWindow 243574->243575 243577 140006dd0 243574->243577 243576 140006e4f 243575->243576 243575->243577 243576->243577 243578 140006e58 PostMessageW 243576->243578 243579 140006f0c 243577->243579 243580 140006ecc 243577->243580 243578->243577 243583 140006f82 243579->243583 243588 140006f38 243579->243588 243702 140008a40 145 API calls _scwprintf 243580->243702 243582 140006f07 243584 140006cf9 243582->243584 243703 14000a3a0 GetTickCount 243583->243703 243586 140006f8f 243586->243588 243587 14000710a 243590 140007152 243587->243590 243599 1400071bc 243587->243599 243588->243587 243589 140007059 FindWindowW 243588->243589 243680 140007011 243588->243680 243591 140007071 GetWindowThreadProcessId GetCurrentThreadId 243589->243591 243592 140007103 243589->243592 243706 140008a40 145 API calls _scwprintf 243590->243706 243591->243592 243595 140007088 243591->243595 243592->243587 243704 140017240 94 API calls 243595->243704 243598 1400070a7 243705 140017240 94 API calls 243598->243705 243601 140007237 FindWindowW 243599->243601 243602 1400071e3 243599->243602 243605 14000725e 243599->243605 243604 14000724b GetWindowThreadProcessId 243601->243604 243601->243605 243707 140008a40 145 API calls _scwprintf 243602->243707 243604->243602 243604->243605 243605->243602 243606 1400072eb 243605->243606 243607 140007402 243606->243607 243609 14000736e 243606->243609 243708 140019f40 9 API calls 243607->243708 243610 140007409 243609->243610 243613 140007447 243609->243613 243610->243609 243709 140019f40 9 API calls 243610->243709 243612 140007440 243612->243613 243623 1400074af 243613->243623 243632 140007573 243613->243632 243710 14000d5b0 62 API calls 243613->243710 243615 140017240 94 API calls 243618 140007854 243615->243618 243616 14000807f 243631 1400080cb 243616->243631 243727 14000d860 62 API calls 243616->243727 243617 140007b52 243624 140007b94 243617->243624 243625 140007b7b 243617->243625 243618->243615 243618->243632 243619 1400078c2 243713 140017240 94 API calls 243619->243713 243622 1400078e8 243714 140017240 94 API calls 243622->243714 243623->243632 243643 1400075aa 243623->243643 243712 14000d860 62 API calls 243623->243712 243628 140007bca 243624->243628 243629 140007ba5 243624->243629 243715 140017240 94 API calls 243625->243715 243637 140007be6 243628->243637 243638 140007c1c 243628->243638 243716 140017240 94 API calls 243629->243716 243630 140007fda 243651 14000800b 243630->243651 243726 14000d860 62 API calls 243630->243726 243635 14000837f 243631->243635 243640 1400083fd 243631->243640 243645 14000832c 243631->243645 243660 140008477 243631->243660 243631->243680 243688 140008572 243631->243688 243728 14000d860 62 API calls 243631->243728 243632->243616 243632->243617 243632->243618 243632->243619 243632->243630 243632->243680 243725 14000d860 62 API calls 243632->243725 243642 14000870e 243635->243642 243650 140008756 243635->243650 243636 140007bc8 243636->243628 243644 140007c0c 243637->243644 243717 140017240 94 API calls 243637->243717 243638->243644 243654 140007c30 243638->243654 243730 140017240 94 API calls 243640->243730 243742 140017240 94 API calls 243642->243742 243643->243632 243711 14000d860 62 API calls 243643->243711 243646 140007cd5 243644->243646 243721 140017240 94 API calls 243644->243721 243729 140017240 94 API calls 243645->243729 243658 140007cf9 243646->243658 243722 140017240 94 API calls 243646->243722 243648 140008494 243732 140017240 94 API calls 243648->243732 243650->243651 243652 1400087ea 243650->243652 243650->243680 243651->243680 243744 140017240 94 API calls 243652->243744 243655 140007c5d 243654->243655 243718 140017240 94 API calls 243654->243718 243667 140007c87 243655->243667 243719 140017240 94 API calls 243655->243719 243723 140017240 94 API calls 243658->243723 243660->243648 243670 1400084b7 243660->243670 243662 1400084b5 243662->243670 243733 140017240 94 API calls 243662->243733 243663 140008734 243743 140017240 94 API calls 243663->243743 243667->243644 243720 140017240 94 API calls 243667->243720 243670->243662 243671 1400084ee 243670->243671 243677 140008523 243671->243677 243678 1400084fd 243671->243678 243676 14000845e 243676->243635 243735 140017240 94 API calls 243677->243735 243678->243677 243734 140017240 94 API calls 243678->243734 243680->243651 243745 140008880 99 API calls 243680->243745 243683 140008545 243683->243635 243736 140017240 94 API calls 243683->243736 243684 140007d14 243684->243680 243724 140017240 94 API calls 243684->243724 243685 14000842b 243685->243676 243731 140017240 94 API calls 243685->243731 243690 14000861b 243688->243690 243691 14000863f 243688->243691 243737 140017240 94 API calls 243690->243737 243693 14000863c 243691->243693 243694 140008665 243691->243694 243693->243691 243738 140017240 94 API calls 243693->243738 243697 140008697 243694->243697 243739 140017240 94 API calls 243694->243739 243740 140017240 94 API calls 243697->243740 243700 1400086b8 243700->243676 243741 140017240 94 API calls 243700->243741 243702->243582 243703->243586 243704->243598 243705->243680 243706->243582 243707->243582 243708->243610 243709->243612 243710->243623 243711->243632 243712->243643 243713->243622 243714->243680 243715->243624 243716->243636 243717->243644 243718->243655 243719->243667 243720->243644 243721->243646 243722->243658 243723->243684 243724->243680 243725->243632 243726->243651 243727->243631 243728->243631 243729->243631 243730->243685 243731->243676 243732->243662 243733->243671 243734->243677 243735->243683 243736->243676 243737->243693 243738->243694 243739->243697 243740->243700 243741->243676 243742->243663 243743->243680 243744->243651 243745->243584 243746 14008d432 243747 14008d47e GetWindowLongW 243746->243747 243748 14008d438 243746->243748 243751 14008d49b 243747->243751 243752 14008d4b1 SetWindowLongW 243747->243752 243749 14008d469 243748->243749 243750 14008d43f 243748->243750 243749->243747 243754 1400accd0 SystemTimeToFileTime 243750->243754 243755 1400ca93c 62 API calls 243751->243755 243753 14008d4aa 243752->243753 243753->243752 243758 1400ca93c 62 API calls 243753->243758 243756 14008d44f 243754->243756 243755->243753 243757 14008d370 243756->243757 243759 14008d367 SendMessageW 243756->243759 243760 1400cb13c free 62 API calls 243757->243760 243761 14008d39f 243757->243761 243758->243753 243759->243757 243760->243761 243762 1400920f3 243763 140092099 CreateWindowExW 243762->243763 243764 140093890 243762->243764 243763->243764 243765 1400938c3 243764->243765 243766 1400938a9 SelectObject 243764->243766 243767 1400938b6 ReleaseDC 243764->243767 243768 140093907 243765->243768 243771 1400938c9 243765->243771 243806 1400b0330 94 API calls 4 library calls 243765->243806 243766->243767 243767->243765 243770 140093915 243768->243770 243775 14009392a 243768->243775 243807 14009db10 7 API calls 243770->243807 243773 140093978 243808 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 243773->243808 243775->243773 243776 140093980 243775->243776 243777 14009398c 243776->243777 243778 1400939c1 243776->243778 243777->243778 243779 140093992 SendMessageW 243777->243779 243780 1400939ca SendMessageW 243778->243780 243781 1400939dd 243778->243781 243779->243778 243780->243781 243809 140097860 8 API calls 243781->243809 243783 1400939f3 243784 140093ac6 243783->243784 243785 140093a0e GetClientRect 243783->243785 243786 140093aad 243783->243786 243787 140093acf GetWindowRect 243784->243787 243797 140093b24 243784->243797 243788 140093a24 243785->243788 243789 140093a47 243785->243789 243786->243784 243810 14009eeb0 8 API calls 243786->243810 243791 140093afb 243787->243791 243787->243797 243788->243789 243792 140093a28 SetWindowLongW 243788->243792 243790 140093a4a SendMessageW 243789->243790 243793 140093a82 MoveWindow 243790->243793 243794 140093a71 SetWindowLongW 243790->243794 243791->243797 243798 140093b0e SendMessageW 243791->243798 243792->243790 243793->243784 243794->243793 243795 140093ba3 243801 140093baf SetWindowPos 243795->243801 243802 140093bd1 243795->243802 243797->243795 243799 140093b40 GetWindowRect MapWindowPoints InvalidateRect 243797->243799 243800 140093b74 243797->243800 243798->243797 243799->243800 243800->243795 243803 140093b7d SetWindowPos 243800->243803 243801->243802 243804 140093be4 MapWindowPoints 243802->243804 243805 140093c22 243802->243805 243803->243795 243804->243805 243805->243771 243806->243768 243807->243775 243808->243776 243809->243783 243810->243784 243811 140001abc 243812 140001ac7 243811->243812 243813 140001ae6 GlobalUnlock 243812->243813 243814 140001afa CloseClipboard 243812->243814 243815 140001b0d 243812->243815 243813->243814 243814->243815 243816 140001b58 243815->243816 243886 140004520 joyGetPosEx PostMessageW 243815->243886 243817 140001b6d 243816->243817 243868 1400041d0 243816->243868 243820 140001b98 SetTimer 243817->243820 243827 140001bbc 243817->243827 243820->243827 243821 140001c7d GetTickCount 243821->243827 243824 140001cbe GetTickCount 243824->243827 243826 1400020ef GetFocus 243826->243827 243827->243821 243827->243826 243829 1400029b3 GetForegroundWindow 243827->243829 243831 1400024e3 IsDialogMessageW 243827->243831 243835 14000265a ShowWindow 243827->243835 243836 140002a5e SetCurrentDirectoryW 243827->243836 243837 14000213a TranslateAcceleratorW 243827->243837 243839 1400041d0 251 API calls 243827->243839 243841 14000245d SendMessageW 243827->243841 243842 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 243827->243842 243843 140002479 SendMessageW 243827->243843 243845 140002337 GetKeyState 243827->243845 243848 14000241b PostMessageW 243827->243848 243849 14000221e GetKeyState 243827->243849 243850 1400023a0 GetWindowLongW 243827->243850 243851 1400023de SendMessageW 243827->243851 243855 140002248 GetWindowLongW 243827->243855 243856 1400022b9 IsWindowEnabled 243827->243856 243857 140003080 DragFinish 243827->243857 243858 1400022d7 GetKeyState 243827->243858 243861 140002014 wcsncpy 243827->243861 243881 140004ea0 243827->243881 243888 1400b4210 GetWindowLongW GetParent GetWindowLongW 243827->243888 243889 14008bfb0 GetWindowLongW GetParent 243827->243889 243890 140004520 joyGetPosEx PostMessageW 243827->243890 243830 1400029c5 GetWindowThreadProcessId 243829->243830 243832 1400029dc GetClassNameW 243830->243832 243831->243827 243833 140002a0e IsDialogMessageW 243832->243833 243833->243827 243835->243827 243836->243827 243837->243827 243839->243827 243841->243827 243842->243827 243843->243827 243844 14000403e 243847 1400040b3 243844->243847 243853 14000408f KillTimer 243844->243853 243845->243827 243846 14000234e GetKeyState 243845->243846 243846->243827 243848->243861 243849->243827 243850->243827 243854 1400023b8 SendMessageW 243850->243854 243851->243827 243852 14009e8b0 191 API calls 243852->243861 243853->243847 243854->243827 243855->243827 243856->243827 243857->243827 243858->243861 243859 14000314a GetTickCount 243859->243861 243861->243827 243861->243844 243861->243852 243861->243859 243887 1400046c0 256 API calls 3 library calls 243861->243887 243891 140004150 GetTickCount 243861->243891 243892 140001820 116 API calls 243861->243892 243893 140004980 243861->243893 243864 14000321b 243864->243821 243901 14000dc00 245 API calls _wcsupr_s_l 243864->243901 243902 140004ae0 243864->243902 243930 140004150 GetTickCount 243864->243930 243869 1400041e4 243868->243869 243871 1400044e7 243868->243871 243870 140004ea0 GetTickCount 243869->243870 243869->243871 243879 14000420f wcsncpy _RunAllParam 243870->243879 243871->243817 243872 1400044c0 243872->243871 243874 140004ae0 96 API calls 243872->243874 243873 14000428c GetTickCount 243873->243879 243874->243871 243877 140004980 4 API calls 243877->243879 243879->243871 243879->243872 243879->243873 243879->243877 243880 140004409 KillTimer 243879->243880 243931 1400a33f0 243879->243931 243952 140001820 116 API calls 243879->243952 243953 140024d30 KillTimer 243879->243953 243880->243879 243882 140001c9d GetMessageW 243881->243882 243883 140004ead 243881->243883 243882->243821 243882->243824 243883->243882 243884 140004ed8 GetTickCount 243883->243884 243884->243882 243885 140004ef3 243884->243885 243885->243882 243886->243816 243887->243861 243888->243827 243889->243827 243890->243827 243891->243861 243892->243861 243895 1400049b3 __initmbctable 243893->243895 243894 1400049f2 243898 140004a20 SetCurrentDirectoryW 243894->243898 243899 140004a26 243894->243899 243895->243894 243963 14001f660 LoadImageW Shell_NotifyIconW 243895->243963 243897 1400031f0 GetTickCount 243897->243864 243898->243899 243899->243897 243900 140004aa4 GetTickCount 243899->243900 243900->243897 243901->243864 243903 140004b02 243902->243903 243904 140004b2d _RunAllParam 243902->243904 243903->243904 243906 1400cb13c free 62 API calls 243903->243906 243905 1400cb13c free 62 API calls 243904->243905 243909 140004b5d _RunAllParam 243904->243909 243905->243909 243906->243904 243907 140004bd1 243913 140004c31 243907->243913 243914 140004c21 243907->243914 243908 140004bb4 243964 1400b1500 94 API calls 3 library calls 243908->243964 243910 1400cb13c free 62 API calls 243909->243910 243912 140004b82 _RunAllParam 243909->243912 243910->243912 243912->243907 243912->243908 243916 140004c68 243913->243916 243918 140004bcc __initmbctable 243913->243918 243919 140004c82 243913->243919 243965 140006090 21 API calls 2 library calls 243914->243965 243966 1400b1bb0 62 API calls free 243916->243966 243921 14001f73b Shell_NotifyIconW 243918->243921 243922 14001f711 LoadImageW 243918->243922 243923 14001f708 243918->243923 243924 14001f758 243918->243924 243919->243918 243920 140004cdc 243919->243920 243927 140004cbf 243919->243927 243925 1400aa420 73 API calls 243920->243925 243921->243924 243922->243921 243923->243921 243924->243864 243925->243918 243926 140004de7 243926->243918 243929 1400ca9c4 malloc 62 API calls 243926->243929 243927->243918 243927->243926 243928 1400cb13c free 62 API calls 243927->243928 243928->243926 243929->243918 243930->243864 243932 1400a346c _wcsupr_s_l 243931->243932 243954 1400a7a50 243932->243954 243933 1400a35ab 243934 1400a3641 243933->243934 243935 1400cb13c free 62 API calls 243933->243935 243934->243879 243935->243934 243937 1400a3585 243937->243933 243957 140014880 65 API calls 243937->243957 243938 1400a35c5 243938->243933 243959 140001820 116 API calls 243938->243959 243941 1400a3599 243943 1400a35a0 243941->243943 243944 1400a3613 243941->243944 243942 1400a35ea 243960 140014880 65 API calls 243942->243960 243958 1400cc690 63 API calls _wcstoi64 243943->243958 243962 1400cbb98 63 API calls _wcstoi64 243944->243962 243948 1400a35f5 243948->243944 243949 1400a35fc 243948->243949 243961 1400cc690 63 API calls _wcstoi64 243949->243961 243952->243879 243953->243879 243955 140032530 241 API calls 243954->243955 243956 1400a34f0 243955->243956 243956->243933 243956->243937 243956->243938 243957->243941 243958->243933 243959->243942 243960->243948 243961->243933 243962->243933 243963->243894 243964->243918 243965->243918 243966->243918 243967 140056b39 243968 140004ea0 GetTickCount 243967->243968 243969 140056b3e 243968->243969 243970 140056b46 PostMessageW 243969->243970 243971 1400568a0 243969->243971 243972 14008c7b7 243977 140097cc0 243972->243977 243974 14008cba6 243975 14008c7c5 243975->243974 243976 1400cb13c free 62 API calls 243975->243976 243976->243974 243978 140097ced 243977->243978 243979 140097cdf 243977->243979 243980 140097d1c IsZoomed IsIconic 243978->243980 243981 140097d13 SetWindowTextW 243978->243981 243979->243975 243982 140097d65 243980->243982 243981->243980 243983 1400980b5 ShowWindow 243982->243983 243987 1400980c6 243982->243987 244014 1400981cd 243982->244014 243983->243987 243984 14009810a IsIconic 243985 140098123 243984->243985 243992 14009823d 243984->243992 243986 1400983b4 243985->243986 244000 14009812d 243985->244000 243986->243992 243994 14009844a GetClientRect 243986->243994 243995 1400983d5 243986->243995 243987->243984 243989 1400980eb 243987->243989 243996 140098108 243987->243996 243988 1400982ac IsWindowVisible 243997 140098645 243988->243997 243998 1400982c2 GetWindowLongW GetMenu GetWindowLongW AdjustWindowRectEx 243988->243998 244042 14009ea90 11 API calls 243989->244042 243990 140098228 GetWindowLongW 243990->243992 243999 140098425 GetWindowRect 243990->243999 243991 14009828b 243991->243988 243992->243988 243992->243991 244018 14009826b 243992->244018 243994->243992 243995->243992 244017 140098414 GetWindowLongW 243995->244017 243996->243984 244001 140098683 243997->244001 244009 140098676 ShowWindow 243997->244009 244010 140098655 GetForegroundWindow 243997->244010 244002 14009832a 243998->244002 244003 14009831c GetSystemMetrics 243998->244003 243999->243992 244007 140098176 GetWindowLongW 244000->244007 244008 140098166 GetParent 244000->244008 244011 1400981fc 244000->244011 244004 14009869e GetAncestor 244001->244004 244001->244014 244005 14009833f 244002->244005 244006 140098331 GetSystemMetrics 244002->244006 244003->244002 244004->244014 244015 1400986b7 GetForegroundWindow 244004->244015 244012 140098371 244005->244012 244013 140098343 SendMessageW 244005->244013 244006->244005 244007->244000 244016 14009818b GetWindowRect MapWindowPoints 244007->244016 244008->244000 244008->244007 244009->244001 244010->244009 244019 140098664 DefDlgProcW 244010->244019 244011->243990 244011->243992 244020 140098488 SystemParametersInfoW 244012->244020 244025 1400983a2 GetClientRect 244012->244025 244013->244012 244014->243975 244021 1400986ce 244015->244021 244022 1400986c6 244015->244022 244016->244000 244017->243992 244017->243999 244043 14009e240 26 API calls 244018->244043 244019->244009 244032 14009849d GetWindowRect 244020->244032 244021->244014 244026 1400986db GetFocus 244021->244026 244044 1400b2670 110 API calls 244022->244044 244025->244032 244027 14009876d SetFocus 244026->244027 244028 1400986f0 244026->244028 244027->244014 244028->244014 244029 1400986f9 GetDlgCtrlID 244028->244029 244030 14009870a GetParent 244029->244030 244031 140098727 244029->244031 244030->244031 244034 14009871b GetDlgCtrlID 244030->244034 244031->244014 244038 140098753 UpdateWindow 244031->244038 244039 140098539 244032->244039 244034->244031 244035 1400985f4 IsZoomed 244036 140098602 ShowWindow 244035->244036 244037 140098611 MoveWindow 244035->244037 244036->244037 244037->243997 244045 14009e240 26 API calls 244038->244045 244039->243997 244039->244035 244041 14009876b 244041->244014 244042->243987 244043->243992 244044->244021 244045->244041 244046 140036efd 244047 140036f23 244046->244047 244048 140036f0a 244046->244048 244052 140036f38 244047->244052 244073 1400ad060 244047->244073 244097 140025200 131 API calls 244048->244097 244051 140036fc9 244055 14003701d 244051->244055 244098 14000c660 62 API calls 244051->244098 244069 1400325d7 244052->244069 244100 140040410 94 API calls _wcsupr_s_l 244052->244100 244054 140036fdb 244054->244055 244056 140036fdf 244054->244056 244077 140024d90 244055->244077 244057 1400ca93c 62 API calls 244056->244057 244060 140036ff2 244057->244060 244060->244052 244061 140036ff6 244060->244061 244099 140025070 KillTimer _RunAllParam 244061->244099 244063 140038ad5 244064 140032611 GetTickCount 244065 140032630 PeekMessageW 244064->244065 244064->244069 244068 140032659 GetTickCount 244065->244068 244065->244069 244066 1400325ea GlobalUnlock 244067 1400325fe CloseClipboard 244066->244067 244067->244064 244068->244069 244069->244063 244069->244064 244069->244066 244069->244067 244069->244068 244070 140032721 GetTickCount 244069->244070 244071 14008a1c0 241 API calls 244069->244071 244072 140032530 241 API calls 244069->244072 244070->244069 244071->244069 244072->244069 244075 1400ad070 244073->244075 244074 1400ad092 244074->244051 244075->244074 244101 1400cbe84 65 API calls _wcsupr_s_l 244075->244101 244078 140024dc8 244077->244078 244081 1400cbd60 73 API calls 244078->244081 244083 140024df2 244078->244083 244079 140024e83 244082 140024eae SetTimer 244079->244082 244084 140024f24 244079->244084 244080 140024ed2 244080->244084 244085 140024eff KillTimer 244080->244085 244081->244083 244082->244084 244083->244079 244083->244080 244088 140024e2b 244083->244088 244086 140024fa4 244084->244086 244089 140024fa6 244084->244089 244102 1400cbe84 65 API calls _wcsupr_s_l 244084->244102 244085->244084 244096 14002501c 244086->244096 244105 1400cbe84 65 API calls _wcsupr_s_l 244086->244105 244087 140025045 GetTickCount 244087->244088 244088->244052 244104 1400cbb98 63 API calls _wcstoi64 244089->244104 244092 140024f92 244092->244089 244094 140024f96 244092->244094 244103 1400cc690 63 API calls _wcstoi64 244094->244103 244096->244087 244096->244088 244097->244047 244098->244054 244099->244069 244100->244069 244101->244074 244102->244092 244103->244086 244104->244086 244105->244096 244106 140056a05 244107 140056a17 244106->244107 244108 140056a3b 244106->244108 244109 140056a45 244107->244109 244110 140056a1d 244107->244110 244108->244109 244111 14005688e DefWindowProcW 244108->244111 244113 140056a4e PostMessageW 244109->244113 244114 140056a6a 244109->244114 244110->244111 244112 140056a27 244110->244112 244115 1400568a0 244111->244115 244120 1400a2a10 97 API calls 244112->244120 244113->244115 244114->244115 244117 140056a81 244114->244117 244121 1400570d0 167 API calls _wcsupr_s_l 244117->244121 244118 140056a34 244118->244115 244120->244118 244121->244118 244122 14009cb0c 244123 14009cb14 244122->244123 244124 14009cdda 244123->244124 244144 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 244123->244144 244125 14009cde1 DefDlgProcW 244124->244125 244127 14009cdf3 244125->244127 244128 14009cb2b 244128->244124 244129 14009cb57 GetSysColor 244128->244129 244130 14009cb52 244128->244130 244131 14009cb64 SetTextColor 244129->244131 244130->244131 244132 14009cbac 244131->244132 244133 14009cb76 244131->244133 244134 14009cbb1 244132->244134 244136 14009cc0a 244132->244136 244137 14009cbd6 244132->244137 244133->244132 244135 14009cb8e SetBkMode GetStockObject 244133->244135 244134->244124 244134->244125 244141 14009cc41 GetSysColor SetBkColor GetSysColorBrush 244134->244141 244142 14009cc67 GetSysColor SetBkColor GetSysColorBrush 244134->244142 244135->244127 244136->244134 244139 14009cc14 SetBkColor 244136->244139 244145 14009e110 GetParent GetWindowRect GetWindowRect IntersectRect 244137->244145 244139->244127 244140 14009cbe1 244140->244134 244143 14009cbef SetBkColor 244140->244143 244141->244127 244142->244124 244142->244127 244143->244127 244144->244128 244145->244140 244146 140092b4c 244147 140092b52 244146->244147 244148 140092b8b CreateWindowExW 244147->244148 244200 1400ae0b0 62 API calls malloc 244147->244200 244151 140092c02 244148->244151 244152 140092c74 244148->244152 244153 140092c28 SendMessageW 244151->244153 244154 140092c07 244151->244154 244157 1400cb13c free 62 API calls 244152->244157 244158 140092c8a 244152->244158 244153->244152 244156 140092c5f SendMessageW 244153->244156 244154->244153 244155 140092c13 SendMessageW 244154->244155 244155->244153 244156->244152 244157->244158 244159 1400938c3 244158->244159 244160 1400938a9 SelectObject 244158->244160 244161 1400938b6 ReleaseDC 244158->244161 244162 1400938c9 244159->244162 244163 140093907 244159->244163 244201 1400b0330 94 API calls 4 library calls 244159->244201 244160->244161 244161->244159 244165 140093915 244163->244165 244169 14009392a 244163->244169 244202 14009db10 7 API calls 244165->244202 244167 140093978 244203 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 244167->244203 244169->244167 244170 140093980 244169->244170 244171 14009398c 244170->244171 244172 1400939c1 244170->244172 244171->244172 244173 140093992 SendMessageW 244171->244173 244174 1400939ca SendMessageW 244172->244174 244175 1400939dd 244172->244175 244173->244172 244174->244175 244204 140097860 8 API calls 244175->244204 244177 1400939f3 244178 140093ac6 244177->244178 244179 140093a0e GetClientRect 244177->244179 244180 140093aad 244177->244180 244181 140093acf GetWindowRect 244178->244181 244182 140093b24 244178->244182 244183 140093a24 244179->244183 244184 140093a47 244179->244184 244180->244178 244205 14009eeb0 8 API calls 244180->244205 244181->244182 244192 140093afb 244181->244192 244190 140093ba3 244182->244190 244193 140093b40 GetWindowRect MapWindowPoints InvalidateRect 244182->244193 244194 140093b74 244182->244194 244183->244184 244186 140093a28 SetWindowLongW 244183->244186 244185 140093a4a SendMessageW 244184->244185 244187 140093a82 MoveWindow 244185->244187 244188 140093a71 SetWindowLongW 244185->244188 244186->244185 244187->244178 244188->244187 244195 140093baf SetWindowPos 244190->244195 244196 140093bd1 244190->244196 244191 140093b0e SendMessageW 244191->244182 244192->244182 244192->244191 244193->244194 244194->244190 244197 140093b7d SetWindowPos 244194->244197 244195->244196 244198 140093be4 MapWindowPoints 244196->244198 244199 140093c22 244196->244199 244197->244190 244198->244199 244199->244162 244200->244148 244201->244163 244202->244169 244203->244170 244204->244177 244205->244178 244206 140037507 244218 14005f720 244206->244218 244208 140032611 GetTickCount 244209 140032630 PeekMessageW 244208->244209 244213 1400325d7 244208->244213 244212 140032659 GetTickCount 244209->244212 244209->244213 244210 1400325ea GlobalUnlock 244211 1400325fe CloseClipboard 244210->244211 244211->244208 244212->244213 244213->244208 244213->244210 244213->244211 244213->244212 244214 140032721 GetTickCount 244213->244214 244215 14008a1c0 241 API calls 244213->244215 244216 140032530 241 API calls 244213->244216 244217 140038ad5 244213->244217 244214->244213 244215->244213 244216->244213 244219 14005f73d _wcsupr_s_l 244218->244219 244248 140043260 244219->244248 244221 14005f751 244222 14005f775 244221->244222 244223 14005f759 244221->244223 244225 14005fb0c 244222->244225 244230 14005f78e wcsncpy 244222->244230 244280 14005f060 244223->244280 244307 14001c010 244225->244307 244226 14005f767 244226->244213 244228 14005fb1b 244246 14005f843 __initmbctable 244228->244246 244315 1400b1500 94 API calls 3 library calls 244228->244315 244231 14005f7f9 SetVolumeLabelW 244230->244231 244232 14005f82b 244231->244232 244234 14005f84b 244231->244234 244304 1400b1500 94 API calls 3 library calls 244232->244304 244235 14005f8a3 244234->244235 244236 14005f890 244234->244236 244238 14005f8dd 244235->244238 244240 14005f901 244235->244240 244235->244246 244305 140006090 21 API calls 2 library calls 244236->244305 244306 1400b1bb0 62 API calls free 244238->244306 244241 14005f95e 244240->244241 244244 14005f93e 244240->244244 244240->244246 244242 1400aa420 73 API calls 244241->244242 244242->244246 244243 14005fa6d 244243->244246 244247 1400ca9c4 malloc 62 API calls 244243->244247 244244->244243 244245 1400cb13c free 62 API calls 244244->244245 244244->244246 244245->244243 244246->244213 244247->244246 244249 1400433a1 244248->244249 244250 140043272 244248->244250 244249->244221 244250->244249 244251 1400ca93c 62 API calls 244250->244251 244252 140043288 244251->244252 244253 14004328c 244252->244253 244254 1400ca93c 62 API calls 244252->244254 244253->244221 244255 1400432a6 244254->244255 244256 1400433b0 244255->244256 244257 1400ca93c 62 API calls 244255->244257 244256->244221 244258 1400432bd 244257->244258 244258->244256 244259 1400ca93c 62 API calls 244258->244259 244260 1400432d4 244259->244260 244261 1400432d8 244260->244261 244316 1400cab94 64 API calls 2 library calls 244260->244316 244261->244221 244263 1400432f8 244264 1400432fc 244263->244264 244265 1400ca93c 62 API calls 244263->244265 244264->244221 244266 140043316 244265->244266 244267 14004331a 244266->244267 244268 1400ca93c 62 API calls 244266->244268 244267->244221 244269 140043334 244268->244269 244270 140043338 244269->244270 244271 1400ca93c 62 API calls 244269->244271 244270->244221 244272 140043352 244271->244272 244273 140043356 244272->244273 244274 1400ca93c 62 API calls 244272->244274 244273->244221 244275 140043370 244274->244275 244276 140043374 244275->244276 244277 1400ca93c 62 API calls 244275->244277 244276->244221 244278 14004338e 244277->244278 244278->244249 244279 1400ca93c 62 API calls 244278->244279 244279->244249 244281 14001c010 94 API calls 244280->244281 244285 14005f083 wcsncpy 244281->244285 244282 14005f42e 244320 14003f1c0 244 API calls 3 library calls 244282->244320 244284 14005f438 244284->244226 244285->244282 244286 14005f0eb GetDiskFreeSpaceExW 244285->244286 244286->244282 244287 14005f113 244286->244287 244288 14005f14a 244287->244288 244290 14005f16b 244287->244290 244317 1400b1500 94 API calls 3 library calls 244288->244317 244291 14005f1ab 244290->244291 244292 14005f19b 244290->244292 244294 14005f1e2 244291->244294 244296 14005f1f6 244291->244296 244302 14005f166 __initmbctable 244291->244302 244318 140006090 21 API calls 2 library calls 244292->244318 244319 1400b1bb0 62 API calls free 244294->244319 244297 14005f256 244296->244297 244300 14005f233 244296->244300 244296->244302 244298 1400aa420 73 API calls 244297->244298 244298->244302 244299 14005f361 244299->244302 244303 1400ca9c4 malloc 62 API calls 244299->244303 244300->244299 244301 1400cb13c free 62 API calls 244300->244301 244300->244302 244301->244299 244302->244226 244303->244302 244304->244246 244305->244246 244306->244246 244308 14001c038 244307->244308 244309 14001c01c 244307->244309 244314 14001c05f _wcsupr_s_l 244308->244314 244322 1400b1bb0 62 API calls free 244308->244322 244321 1400b1500 94 API calls 3 library calls 244309->244321 244311 14001c033 244311->244228 244313 14001c089 244313->244228 244315->244246 244316->244263 244317->244302 244318->244302 244319->244302 244320->244284 244321->244311 244322->244313 244323 14008d00f 244325 14008d020 _scwprintf 244323->244325 244324 14008d042 244327 140094d50 130 API calls 244324->244327 244325->244324 244326 14008d02e SendMessageW 244325->244326 244326->244324 244329 14008d095 244327->244329 244328 14008d39f 244329->244328 244330 1400cb13c free 62 API calls 244329->244330 244330->244328 244331 140097541 244344 14009e000 244331->244344 244334 14009755b SendMessageW 244335 1400975da 244334->244335 244337 1400975ec SendMessageW 244335->244337 244338 14009761b 244335->244338 244337->244338 244339 140097614 244337->244339 244340 140097620 InvalidateRect 244338->244340 244341 14009762e 244338->244341 244339->244338 244339->244340 244340->244341 244342 14009763c 244341->244342 244360 14003fad0 94 API calls 3 library calls 244341->244360 244345 14009e021 244344->244345 244346 14009e037 244344->244346 244345->244346 244349 14009e03f 244345->244349 244361 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 244346->244361 244348 14009e096 244351 14009e09f SendMessageW 244348->244351 244352 14009e0b4 244348->244352 244349->244348 244350 14009e08d SendMessageW 244349->244350 244350->244348 244351->244352 244353 14009e0be 244352->244353 244362 14009e110 GetParent GetWindowRect GetWindowRect IntersectRect 244352->244362 244354 140097557 244353->244354 244358 14009e0c3 SendMessageW 244353->244358 244354->244334 244354->244335 244357 14009e0d3 244357->244358 244359 14009e0d7 GetSysColor 244357->244359 244358->244354 244359->244358 244360->244342 244361->244349 244362->244357 244363 14002e64c 244364 14002e656 244363->244364 244371 14002e672 244364->244371 244393 1400ad230 89 API calls 244364->244393 244367 14002e7a1 244388 1400aa360 244367->244388 244370 14002e714 244374 14002e2a0 62 API calls 244370->244374 244382 14002e75a __initmbctable 244370->244382 244371->244382 244384 14002ec50 244371->244384 244372 1400ca93c 62 API calls 244373 14002e70c 244372->244373 244373->244367 244373->244370 244374->244382 244375 14002e7f2 244378 1400aa4b0 73 API calls 244375->244378 244381 14002e81c __initmbctable 244375->244381 244375->244382 244376 14002e7b3 244376->244375 244377 1400aa4b0 73 API calls 244376->244377 244376->244382 244377->244375 244378->244381 244379 14002e968 244379->244382 244394 1400cbba4 65 API calls 4 library calls 244379->244394 244381->244379 244381->244382 244383 1400ca9c4 malloc 62 API calls 244381->244383 244383->244379 244387 14002ec71 244384->244387 244385 14002e6e8 244385->244367 244385->244370 244385->244372 244386 1400ca93c 62 API calls 244386->244387 244387->244385 244387->244386 244389 1400aa379 244388->244389 244390 1400aa405 244388->244390 244389->244390 244391 1400aa420 73 API calls 244389->244391 244390->244376 244392 1400aa3b2 __initmbctable 244391->244392 244392->244376 244393->244371 244394->244382 244395 140038450 244407 14008cc40 244395->244407 244397 140032611 GetTickCount 244398 1400325d7 244397->244398 244399 140032630 PeekMessageW 244397->244399 244398->244397 244400 1400325ea GlobalUnlock 244398->244400 244401 1400325fe CloseClipboard 244398->244401 244402 140032659 GetTickCount 244398->244402 244403 140032721 GetTickCount 244398->244403 244404 14008a1c0 241 API calls 244398->244404 244405 140032530 241 API calls 244398->244405 244406 140038ad5 244398->244406 244399->244398 244399->244402 244400->244401 244401->244397 244402->244398 244403->244398 244404->244398 244405->244398 244440 14008bac0 244407->244440 244409 14008cc87 244465 14008b340 244409->244465 244411 14008cc9e 244412 14008cca6 244411->244412 244503 14009b300 244411->244503 244523 14003f1c0 244 API calls 3 library calls 244412->244523 244414 14008ccb0 244414->244398 244416 14008ccd0 244416->244412 244417 14008ccd9 244416->244417 244418 14008cd11 244417->244418 244419 14008cd32 244417->244419 244524 1400b1500 94 API calls 3 library calls 244418->244524 244421 14008cd6a 244419->244421 244422 14008cd5a 244419->244422 244424 14008cda1 244421->244424 244427 14008cd2d __initmbctable 244421->244427 244428 14008cdb1 244421->244428 244525 140006090 21 API calls 2 library calls 244422->244525 244526 1400b1bb0 62 API calls free 244424->244526 244426 14008d571 IsWindowVisible 244429 14008d582 GetWindowRect 244426->244429 244433 14008d370 244426->244433 244427->244426 244427->244433 244428->244427 244431 14008ce0b 244428->244431 244436 14008cdee 244428->244436 244430 14008da62 MapWindowPoints InvalidateRect 244429->244430 244430->244433 244435 1400aa420 73 API calls 244431->244435 244432 14008d39f 244432->244398 244433->244432 244434 1400cb13c free 62 API calls 244433->244434 244434->244432 244435->244427 244436->244427 244437 1400cb13c free 62 API calls 244436->244437 244439 14008cf16 244436->244439 244437->244439 244438 1400ca9c4 malloc 62 API calls 244438->244427 244439->244427 244439->244438 244441 14008bafb 244440->244441 244445 14008bd44 244440->244445 244527 14008aea0 65 API calls wcsncpy 244441->244527 244443 14008bb09 244443->244445 244449 14008bb1a __initmbctable 244443->244449 244452 14008bdb0 244445->244452 244453 14008bdfb 244445->244453 244533 1400cbe84 65 API calls _wcsupr_s_l 244445->244533 244447 14008bc0f 244463 14008bc42 244447->244463 244529 14008bef0 62 API calls 244447->244529 244449->244447 244462 14008bbb6 244449->244462 244449->244463 244528 1400cbe84 65 API calls _wcsupr_s_l 244449->244528 244451 14008be47 244535 1400cc6c0 63 API calls _wcstoi64 244451->244535 244452->244453 244534 140014880 65 API calls 244452->244534 244453->244463 244537 14008c020 62 API calls 244453->244537 244456 14008be62 244536 14008bfb0 GetWindowLongW GetParent 244456->244536 244457 14008bc21 244457->244463 244530 1400b2210 89 API calls 244457->244530 244460 14008bcfc 244532 1400cc6c0 63 API calls _wcstoi64 244460->244532 244462->244447 244462->244460 244531 1400cbe84 65 API calls _wcsupr_s_l 244462->244531 244463->244409 244466 14008b35c 244465->244466 244467 14008b351 244465->244467 244468 14008b537 244466->244468 244469 1400ca93c 62 API calls 244466->244469 244467->244411 244468->244411 244470 14008b37c 244469->244470 244471 14008b380 244470->244471 244472 1400ca93c 62 API calls 244470->244472 244471->244411 244473 14008b39a 244472->244473 244474 14008b39e 244473->244474 244475 1400ca93c 62 API calls 244473->244475 244474->244411 244477 14008b3b8 244475->244477 244476 14008b3bc 244476->244411 244477->244476 244478 1400ca93c 62 API calls 244477->244478 244480 14008b3d6 244478->244480 244479 14008b3da 244479->244411 244480->244479 244481 1400ca93c 62 API calls 244480->244481 244482 14008b3f4 244481->244482 244483 14008b3f8 244482->244483 244484 1400ca93c 62 API calls 244482->244484 244483->244411 244485 14008b412 244484->244485 244486 14008b416 244485->244486 244487 1400ca93c 62 API calls 244485->244487 244486->244411 244489 14008b430 244487->244489 244488 14008b434 244488->244411 244489->244488 244490 14008b465 244489->244490 244539 1400148f0 65 API calls 244489->244539 244538 1400cab94 64 API calls 2 library calls 244490->244538 244493 14008b47c 244494 14008b480 244493->244494 244540 1400cab94 64 API calls 2 library calls 244493->244540 244494->244411 244496 14008b4c1 244496->244411 244497 14008b4bd 244497->244496 244541 1400cab94 64 API calls 2 library calls 244497->244541 244499 14008b4e8 244500 14008b4ec 244499->244500 244542 1400cab94 64 API calls 2 library calls 244499->244542 244500->244411 244504 14009b314 244503->244504 244507 14009b320 244503->244507 244504->244416 244505 14002e2a0 62 API calls 244506 14009b479 244505->244506 244508 14009b4da 244506->244508 244510 14002e2a0 62 API calls 244506->244510 244514 14009b563 244506->244514 244518 14009b38c 244507->244518 244519 14009b3da 244507->244519 244555 1400cbe84 65 API calls _wcsupr_s_l 244507->244555 244508->244514 244543 1400b3c40 244508->244543 244510->244508 244512 14009b530 GetDlgCtrlID 244513 14009b546 GetParent 244512->244513 244512->244514 244513->244514 244515 14009b557 GetDlgCtrlID 244513->244515 244514->244416 244515->244514 244517 14009b426 244557 1400cc6c0 63 API calls _wcstoi64 244517->244557 244518->244519 244556 140014880 65 API calls 244518->244556 244519->244505 244519->244514 244521 14009b441 244558 140001980 GetDlgCtrlID GetParent GetDlgCtrlID 244521->244558 244523->244414 244524->244427 244525->244427 244526->244427 244527->244443 244528->244462 244529->244457 244530->244463 244531->244460 244532->244447 244533->244452 244534->244451 244535->244456 244536->244453 244537->244463 244538->244493 244540->244497 244541->244499 244545 1400b3c50 _wcsupr_s_l 244543->244545 244544 1400b3c5e 244544->244512 244545->244544 244546 1400b3db6 GetWindowLongW 244545->244546 244551 1400b3c8c wcsncpy 244545->244551 244547 1400b3dc7 GetTopWindow 244546->244547 244548 1400b3da4 244546->244548 244547->244548 244549 1400b3dd8 GetTopWindow 244547->244549 244548->244512 244549->244548 244552 1400b3d53 EnumChildWindows 244551->244552 244552->244548 244553 1400b3d75 244552->244553 244553->244548 244554 1400b3d7f EnumChildWindows 244553->244554 244554->244548 244555->244518 244556->244517 244557->244521 244558->244519 244559 1400374ce 244560 14005f060 245 API calls 244559->244560 244566 1400325d7 244560->244566 244561 140032611 GetTickCount 244562 140032630 PeekMessageW 244561->244562 244561->244566 244565 140032659 GetTickCount 244562->244565 244562->244566 244563 1400325ea GlobalUnlock 244564 1400325fe CloseClipboard 244563->244564 244564->244561 244565->244566 244566->244561 244566->244563 244566->244564 244566->244565 244567 140032721 GetTickCount 244566->244567 244568 14008a1c0 241 API calls 244566->244568 244569 140032530 241 API calls 244566->244569 244570 140038ad5 244566->244570 244567->244566 244568->244566 244569->244566 244571 1400330d8 244572 1400ca93c 62 API calls 244571->244572 244573 1400330eb 244572->244573 244574 1400330f6 244573->244574 244575 140033145 244573->244575 244586 1400325d7 244574->244586 244590 14003d330 244574->244590 244576 14003315e 244575->244576 244575->244586 244606 14003d7a0 242 API calls 5 library calls 244576->244606 244579 14003317f 244579->244586 244580 140038ad5 244581 140032611 GetTickCount 244582 140032630 PeekMessageW 244581->244582 244581->244586 244585 140032659 GetTickCount 244582->244585 244582->244586 244583 1400325ea GlobalUnlock 244584 1400325fe CloseClipboard 244583->244584 244584->244581 244585->244586 244586->244580 244586->244581 244586->244583 244586->244584 244586->244585 244587 140032721 GetTickCount 244586->244587 244588 14008a1c0 241 API calls 244586->244588 244589 140032530 241 API calls 244586->244589 244587->244586 244588->244586 244589->244586 244591 14003d36a 244590->244591 244592 1400ca9c4 malloc 62 API calls 244591->244592 244596 14003d377 _wcsupr_s_l wcsncpy 244591->244596 244593 14003d3b3 244592->244593 244594 14003d3bb 244593->244594 244593->244596 244607 140040410 94 API calls _wcsupr_s_l 244594->244607 244597 140032530 241 API calls 244596->244597 244598 14003d76c 244596->244598 244600 14003d6b4 GetTickCount 244596->244600 244602 14003d66b 244596->244602 244604 14008a1c0 241 API calls 244596->244604 244608 140077c90 66 API calls 244596->244608 244597->244596 244599 1400cb13c free 62 API calls 244598->244599 244601 14003d3d4 244598->244601 244599->244601 244600->244596 244601->244586 244602->244601 244603 1400cb13c free 62 API calls 244602->244603 244603->244601 244604->244596 244606->244579 244607->244601 244608->244596 244609 14003d61b 244610 140032530 241 API calls 244609->244610 244611 14003d610 244610->244611 244611->244609 244620 14003d460 244611->244620 244612 14003d66b 244615 1400cb13c free 62 API calls 244612->244615 244616 14003d683 244612->244616 244613 14003d6b4 GetTickCount 244613->244620 244614 14003d76c 244614->244616 244618 1400cb13c free 62 API calls 244614->244618 244615->244616 244617 14008a1c0 241 API calls 244617->244620 244618->244616 244620->244612 244620->244613 244620->244614 244620->244617 244621 140032530 241 API calls 244620->244621 244622 140077c90 66 API calls 244620->244622 244621->244620 244622->244620 244623 140001e5c 244624 140001ebc PeekMessageW 244623->244624 244625 140001e65 244623->244625 244627 140001ef8 GetTickCount 244624->244627 244636 140001c03 244624->244636 244625->244624 244628 140001e87 GetTickCount 244625->244628 244629 140001f19 Sleep 244627->244629 244628->244624 244630 140001ea2 244628->244630 244629->244636 244630->244624 244632 140001c7d GetTickCount 244632->244636 244634 1400020ef GetFocus 244634->244636 244635 140004ea0 GetTickCount 244637 140001c9d GetMessageW 244635->244637 244636->244632 244636->244634 244636->244635 244640 1400029b3 GetForegroundWindow 244636->244640 244642 1400024e3 IsDialogMessageW 244636->244642 244646 14000265a ShowWindow 244636->244646 244647 140002a5e SetCurrentDirectoryW 244636->244647 244648 14000213a TranslateAcceleratorW 244636->244648 244650 1400041d0 251 API calls 244636->244650 244652 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 244636->244652 244653 14000245d SendMessageW 244636->244653 244654 140002479 SendMessageW 244636->244654 244656 140002337 GetKeyState 244636->244656 244659 14000241b PostMessageW 244636->244659 244660 14000221e GetKeyState 244636->244660 244661 1400023a0 GetWindowLongW 244636->244661 244662 1400023de SendMessageW 244636->244662 244665 140002248 GetWindowLongW 244636->244665 244666 1400022b9 IsWindowEnabled 244636->244666 244667 140003080 DragFinish 244636->244667 244668 1400022d7 GetKeyState 244636->244668 244672 140001cd1 wcsncpy 244636->244672 244680 1400b4210 GetWindowLongW GetParent GetWindowLongW 244636->244680 244681 14008bfb0 GetWindowLongW GetParent 244636->244681 244682 140004520 joyGetPosEx PostMessageW 244636->244682 244637->244632 244639 140001cbe GetTickCount 244637->244639 244639->244636 244639->244672 244641 1400029c5 GetWindowThreadProcessId 244640->244641 244643 1400029dc GetClassNameW 244641->244643 244642->244636 244644 140002a0e IsDialogMessageW 244643->244644 244644->244636 244646->244636 244647->244636 244648->244636 244650->244636 244652->244636 244653->244636 244654->244636 244655 14000403e 244658 1400040b3 244655->244658 244663 14000408f KillTimer 244655->244663 244656->244636 244657 14000234e GetKeyState 244656->244657 244657->244636 244659->244672 244660->244636 244661->244636 244664 1400023b8 SendMessageW 244661->244664 244662->244636 244663->244658 244664->244636 244665->244636 244666->244636 244667->244636 244668->244672 244669 14009e8b0 191 API calls 244669->244672 244670 14000314a GetTickCount 244670->244672 244672->244636 244672->244655 244672->244669 244672->244670 244673 140004980 4 API calls 244672->244673 244679 1400046c0 256 API calls 3 library calls 244672->244679 244683 140004150 GetTickCount 244672->244683 244684 140001820 116 API calls 244672->244684 244674 1400031f0 GetTickCount 244673->244674 244676 14000321b 244674->244676 244676->244632 244677 140004ae0 96 API calls 244676->244677 244685 14000dc00 245 API calls _wcsupr_s_l 244676->244685 244686 140004150 GetTickCount 244676->244686 244677->244676 244679->244672 244680->244636 244681->244636 244682->244636 244683->244672 244684->244672 244685->244676 244686->244676 244687 140003ede 244688 140003ec0 244687->244688 244726 140001c03 244687->244726 244690 1400a33f0 241 API calls 244688->244690 244689 140004ae0 96 API calls 244689->244726 244690->244726 244691 140001c7d GetTickCount 244691->244726 244692 140004ea0 GetTickCount 244693 140001c9d GetMessageW 244692->244693 244693->244691 244694 140001cbe GetTickCount 244693->244694 244694->244726 244696 1400020ef GetFocus 244696->244726 244698 1400029b3 GetForegroundWindow 244699 1400029c5 GetWindowThreadProcessId 244698->244699 244701 1400029dc GetClassNameW 244699->244701 244700 1400024e3 IsDialogMessageW 244700->244726 244702 140002a0e IsDialogMessageW 244701->244702 244702->244726 244704 14000265a ShowWindow 244704->244726 244705 140002a5e SetCurrentDirectoryW 244705->244726 244706 14000213a TranslateAcceleratorW 244706->244726 244708 1400041d0 251 API calls 244708->244726 244709 140004150 GetTickCount 244731 140002014 wcsncpy 244709->244731 244710 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 244710->244726 244711 14000245d SendMessageW 244711->244726 244712 140002479 SendMessageW 244712->244726 244713 14000403e 244716 1400040b3 244713->244716 244722 14000408f KillTimer 244713->244722 244714 140002337 GetKeyState 244715 14000234e GetKeyState 244714->244715 244714->244726 244715->244726 244717 14000241b PostMessageW 244717->244731 244718 14000221e GetKeyState 244718->244726 244719 1400023a0 GetWindowLongW 244723 1400023b8 SendMessageW 244719->244723 244719->244726 244720 1400023de SendMessageW 244720->244726 244721 14009e8b0 191 API calls 244721->244731 244722->244716 244723->244726 244724 140002248 GetWindowLongW 244724->244726 244725 1400022b9 IsWindowEnabled 244725->244726 244726->244689 244726->244691 244726->244692 244726->244696 244726->244698 244726->244700 244726->244704 244726->244705 244726->244706 244726->244708 244726->244710 244726->244711 244726->244712 244726->244714 244726->244717 244726->244718 244726->244719 244726->244720 244726->244724 244726->244725 244727 140003080 DragFinish 244726->244727 244728 1400022d7 GetKeyState 244726->244728 244726->244731 244736 1400b4210 GetWindowLongW GetParent GetWindowLongW 244726->244736 244737 14008bfb0 GetWindowLongW GetParent 244726->244737 244738 140004520 joyGetPosEx PostMessageW 244726->244738 244727->244726 244728->244731 244729 14000314a GetTickCount 244729->244731 244731->244691 244731->244709 244731->244713 244731->244721 244731->244726 244731->244729 244732 140004980 4 API calls 244731->244732 244735 1400046c0 256 API calls 3 library calls 244731->244735 244739 140001820 116 API calls 244731->244739 244740 14000dc00 245 API calls _wcsupr_s_l 244731->244740 244733 1400031f0 GetTickCount 244732->244733 244733->244731 244735->244731 244736->244726 244737->244726 244738->244726 244739->244731 244740->244731 244741 14003841e 244753 14008c160 244741->244753 244743 140038ad5 244744 140032611 GetTickCount 244745 140032630 PeekMessageW 244744->244745 244750 1400325d7 244744->244750 244748 140032659 GetTickCount 244745->244748 244745->244750 244746 1400325ea GlobalUnlock 244747 1400325fe CloseClipboard 244746->244747 244747->244744 244748->244750 244749 140032721 GetTickCount 244749->244750 244750->244743 244750->244744 244750->244746 244750->244747 244750->244748 244750->244749 244751 14008a1c0 241 API calls 244750->244751 244752 140032530 241 API calls 244750->244752 244751->244750 244752->244750 244754 14008bac0 95 API calls 244753->244754 244755 14008c1af 244754->244755 244773 14008c1be 244755->244773 244813 14008b0d0 244755->244813 244757 14008c1e2 244758 14008c35c 244757->244758 244759 14008c235 244757->244759 244757->244773 244760 1400ca93c 62 API calls 244758->244760 244761 14008c23e 244759->244761 244762 14008c343 244759->244762 244770 14008c272 244760->244770 244764 14008c27c 244761->244764 244771 14008c243 244761->244771 244763 14008c34c 244762->244763 244780 14008c328 _RunAllParam 244762->244780 244883 14008f4f0 77 API calls 2 library calls 244763->244883 244766 14008c298 244764->244766 244768 1400ca9c4 malloc 62 API calls 244764->244768 244796 14008c2e7 __initmbctable 244764->244796 244769 1400cbd60 73 API calls 244766->244769 244766->244780 244767 1400cb13c free 62 API calls 244767->244773 244768->244766 244775 14008c2b2 244769->244775 244776 14008c3d8 244770->244776 244770->244780 244811 14008c473 __initmbctable 244770->244811 244884 1400cbba4 65 API calls 4 library calls 244770->244884 244771->244770 244777 14008c265 244771->244777 244772 14008c527 244772->244780 244794 14008c56d 244772->244794 244871 14008f820 244772->244871 244773->244750 244774 1400cb13c free 62 API calls 244774->244780 244781 14008c2c4 244775->244781 244882 14008b950 77 API calls 244775->244882 244779 14008c401 244776->244779 244776->244780 244783 1400ca9c4 malloc 62 API calls 244776->244783 244881 14008f4f0 77 API calls 2 library calls 244777->244881 244779->244780 244785 1400cbd60 73 API calls 244779->244785 244780->244767 244780->244773 244781->244780 244791 1400ca9c4 malloc 62 API calls 244781->244791 244783->244779 244790 14008c41b 244785->244790 244788 14008c26d 244788->244770 244789 14008c53e 244792 14008c542 244789->244792 244789->244794 244793 14008c42d 244790->244793 244885 14008b950 77 API calls 244790->244885 244791->244796 244887 14008f4f0 77 API calls 2 library calls 244792->244887 244793->244780 244804 1400ca9c4 malloc 62 API calls 244793->244804 244797 1400cb13c free 62 API calls 244794->244797 244803 14008c590 _RunAllParam 244794->244803 244796->244774 244796->244780 244797->244803 244800 14008c5f9 _RunAllParam 244800->244780 244805 14008c62e SetWindowTextW 244800->244805 244801 14008c5b9 244801->244780 244801->244800 244807 1400cb13c free 62 API calls 244801->244807 244802 14008c354 244802->244780 244803->244801 244888 1400b0330 94 API calls 4 library calls 244803->244888 244806 14008c448 244804->244806 244805->244780 244806->244780 244808 1400ca9c4 malloc 62 API calls 244806->244808 244807->244800 244809 14008c46b 244808->244809 244810 14008c4b3 244809->244810 244809->244811 244812 1400cb13c free 62 API calls 244810->244812 244811->244772 244886 140093f10 154 API calls _wcstoi64 244811->244886 244812->244780 244814 14008b332 244813->244814 244815 14008b0e5 244813->244815 244814->244757 244815->244814 244816 1400ca93c 62 API calls 244815->244816 244817 14008b105 244816->244817 244818 14008b109 244817->244818 244819 1400ca93c 62 API calls 244817->244819 244818->244757 244820 14008b123 244819->244820 244821 14008b127 244820->244821 244822 1400ca93c 62 API calls 244820->244822 244821->244757 244823 14008b141 244822->244823 244824 14008b145 244823->244824 244825 1400ca93c 62 API calls 244823->244825 244824->244757 244826 14008b15f 244825->244826 244827 14008b327 244826->244827 244828 1400ca93c 62 API calls 244826->244828 244827->244757 244829 14008b176 244828->244829 244829->244827 244830 1400ca93c 62 API calls 244829->244830 244831 14008b18d 244830->244831 244832 14008b191 244831->244832 244833 1400ca93c 62 API calls 244831->244833 244832->244757 244834 14008b1ab 244833->244834 244835 14008b1af 244834->244835 244836 1400ca93c 62 API calls 244834->244836 244835->244757 244837 14008b1c9 244836->244837 244838 14008b1cd 244837->244838 244839 1400ca93c 62 API calls 244837->244839 244838->244757 244840 14008b1e7 244839->244840 244841 14008b1eb 244840->244841 244842 1400ca93c 62 API calls 244840->244842 244841->244757 244843 14008b205 244842->244843 244844 14008b209 244843->244844 244845 1400ca93c 62 API calls 244843->244845 244844->244757 244846 14008b223 244845->244846 244847 14008b227 244846->244847 244848 1400ca93c 62 API calls 244846->244848 244847->244757 244849 14008b241 244848->244849 244850 14008b245 244849->244850 244851 1400ca93c 62 API calls 244849->244851 244850->244757 244872 14008f833 244871->244872 244873 14008f83e _scwprintf 244871->244873 244872->244789 244876 14008f86a LoadCursorW RegisterClassExW 244873->244876 244879 14008f923 244873->244879 244874 14008f93a CreateWindowExW 244877 14008f98b SendMessageW SendMessageW 244874->244877 244878 14008f8f1 244874->244878 244876->244878 244876->244879 244877->244789 244878->244789 244879->244874 244889 14008fb00 131 API calls wcsncpy 244879->244889 244881->244788 244882->244781 244883->244802 244884->244776 244885->244793 244886->244772 244887->244802 244888->244801 244889->244874 244890 140093558 CreateWindowExW 244891 1400935c4 244890->244891 244893 140093602 244890->244893 244892 14009e000 11 API calls 244891->244892 244895 1400935d9 244892->244895 244894 1400938c3 244893->244894 244896 1400938a9 SelectObject 244893->244896 244897 1400938b6 ReleaseDC 244893->244897 244900 140093907 244894->244900 244904 1400938c9 244894->244904 244940 1400b0330 94 API calls 4 library calls 244894->244940 244895->244893 244898 1400935e6 244895->244898 244896->244897 244897->244894 244939 1400148f0 65 API calls 244898->244939 244903 140093915 244900->244903 244906 14009392a 244900->244906 244941 14009db10 7 API calls 244903->244941 244907 140093978 244906->244907 244909 140093980 244906->244909 244942 1400afa60 LoadLibraryW GetProcAddress FreeLibrary 244907->244942 244910 14009398c 244909->244910 244911 1400939c1 244909->244911 244910->244911 244912 140093992 SendMessageW 244910->244912 244913 1400939ca SendMessageW 244911->244913 244914 1400939dd 244911->244914 244912->244911 244913->244914 244943 140097860 8 API calls 244914->244943 244916 1400939f3 244917 140093ac6 244916->244917 244918 140093a0e GetClientRect 244916->244918 244919 140093aad 244916->244919 244920 140093acf GetWindowRect 244917->244920 244930 140093b24 244917->244930 244921 140093a24 244918->244921 244922 140093a47 244918->244922 244919->244917 244944 14009eeb0 8 API calls 244919->244944 244924 140093afb 244920->244924 244920->244930 244921->244922 244925 140093a28 SetWindowLongW 244921->244925 244923 140093a4a SendMessageW 244922->244923 244926 140093a82 MoveWindow 244923->244926 244927 140093a71 SetWindowLongW 244923->244927 244924->244930 244931 140093b0e SendMessageW 244924->244931 244925->244923 244926->244917 244927->244926 244928 140093ba3 244934 140093baf SetWindowPos 244928->244934 244935 140093bd1 244928->244935 244930->244928 244932 140093b40 GetWindowRect MapWindowPoints InvalidateRect 244930->244932 244933 140093b74 244930->244933 244931->244930 244932->244933 244933->244928 244936 140093b7d SetWindowPos 244933->244936 244934->244935 244937 140093c22 244935->244937 244938 140093be4 MapWindowPoints 244935->244938 244936->244928 244937->244904 244938->244937 244940->244900 244941->244906 244942->244909 244943->244916 244944->244917 244945 1400cd994 GetStartupInfoW 244947 1400cd9c3 244945->244947 244985 1400cf0e4 HeapCreate 244947->244985 244949 1400cda2a 244990 1400ce9d0 244949->244990 244951 1400cda16 245073 1400cee40 62 API calls 4 library calls 244951->245073 244952 1400cda11 245072 1400cf0a0 62 API calls 2 library calls 244952->245072 244957 1400cda20 245074 1400cac68 GetModuleHandleW GetProcAddress ExitProcess malloc 244957->245074 244986 1400cf10c GetVersion 244985->244986 244987 1400cda04 244985->244987 244988 1400cf130 244986->244988 244989 1400cf116 HeapSetInformation 244986->244989 244987->244949 244987->244951 244987->244952 244988->244987 244989->244988 245082 1400cac98 244990->245082 245072->244951 245073->244957 245097 1400ce708 EncodePointer 245082->245097
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: IconicTextWindowZoomed
                          • String ID: Invalid option.
                          • API String ID: 3288056585-1388095337
                          • Opcode ID: af2d661ae31bfc287422c076ad29fe83e6ae27bc1c06e7c025fbf54407bc9468
                          • Instruction ID: 07962b37db13e78d4ddc094a15ef24dc9b051bfc747895499835f1b385e09b71
                          • Opcode Fuzzy Hash: af2d661ae31bfc287422c076ad29fe83e6ae27bc1c06e7c025fbf54407bc9468
                          • Instruction Fuzzy Hash: 2342AC72B00A818BFB668FA6D4447ED37A1F748BD8F104515EF1A53BA4DB78D8A4CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 837 140056150-14005617b 838 14005617d-140056193 RegisterWindowMessageW 837->838 839 140056199-1400561aa 837->839 838->839 840 1400561fc-140056207 839->840 841 1400561ac-1400561b3 839->841 842 14005620f-140056226 840->842 843 140056209-14005620c 840->843 844 1400561b5-1400561bc 841->844 845 1400561be-1400561c5 841->845 846 14005638a-140056391 842->846 847 14005622c 842->847 843->842 844->840 844->845 845->840 848 1400561c7-1400561e9 call 1400045a0 845->848 851 140056397 846->851 852 14005691e-140056925 846->852 849 140056232-14005623a 847->849 850 14005636d-14005637d call 140056d60 847->850 871 1400561f5 848->871 872 1400561eb-1400561f0 848->872 856 140056845-14005684c 849->856 857 140056240-140056256 849->857 864 14005688e-14005689a DefWindowProcW 850->864 875 140056383-140056385 850->875 859 1400568d3-1400568dd 851->859 860 14005639d-1400563a4 851->860 854 1400569d9-1400569e4 852->854 855 14005692b 852->855 854->856 873 1400569ea-140056a00 854->873 862 140056968-14005696f 855->862 863 14005692d-140056934 855->863 856->864 865 14005684e-140056855 856->865 857->850 867 1400568df-1400568e8 859->867 868 1400568ea-1400568ed 859->868 869 1400563aa 860->869 870 14005682b-140056832 860->870 876 140056971-140056978 862->876 877 14005697a-140056997 PostMessageW 862->877 863->856 874 14005693a-140056952 PostMessageW call 140004ea0 863->874 883 1400568a0-1400568a8 864->883 865->864 882 140056857-140056868 Shell_NotifyIconW 865->882 867->883 885 140056961-140056963 868->885 886 1400568ef-14005691c SendMessageTimeoutW 868->886 878 1400563b0-1400563b8 869->878 879 1400567ea-14005681d GetMenu CheckMenuItem 869->879 880 140056838-14005683f 870->880 881 1400568ca-1400568d1 870->881 871->840 884 1400568b0-1400568c9 872->884 874->885 899 140056954-14005695c call 140001a70 874->899 875->883 876->877 888 14005699d-1400569a7 876->888 877->888 889 1400567b5-1400567bc 878->889 890 1400563be-1400563c0 878->890 879->864 891 14005681f-140056829 879->891 880->856 880->862 881->864 882->864 892 14005686a-140056887 Shell_NotifyIconW 882->892 883->884 885->883 886->883 888->885 896 1400569a9-1400569d4 SendMessageTimeoutW 888->896 894 1400567be-1400567c5 889->894 895 1400567cb-1400567d5 889->895 897 1400563c6-1400563c9 890->897 898 14005679a-14005679d 890->898 891->864 892->864 894->864 894->895 895->864 901 1400567db 895->901 896->883 897->856 902 1400563cf-1400563d3 897->902 898->864 900 1400567a3-1400567aa 898->900 899->885 900->885 904 1400567b0 900->904 905 1400567dd-1400567e5 ShowWindow 901->905 906 140056436-14005643d 902->906 907 1400563d5-1400563df 902->907 904->899 905->883 906->864 910 140056443-14005644a 906->910 908 1400563e1-1400563e7 907->908 909 14005641e-140056425 907->909 908->905 911 1400563ed-140056419 MoveWindow 908->911 909->864 912 14005642b-14005642f 909->912 910->864 913 140056450-14005645a 910->913 911->883 912->913 914 140056431 912->914 915 140056461-140056464 913->915 914->864 916 140056466-14005646f 915->916 917 140056471-140056479 915->917 916->915 916->917 918 1400564b2 917->918 919 14005647b-14005648c 917->919 920 1400564b9-1400564c7 918->920 921 140056490-140056493 919->921 924 1400564cd-1400564d1 920->924 925 1400566ac-1400566b8 920->925 922 140056495-14005649e 921->922 923 1400564a0-1400564a3 921->923 922->921 922->923 923->864 926 1400564a9-1400564b0 923->926 927 140056545-14005654c 924->927 928 1400564d3-1400564da 924->928 929 1400566c3-1400566e5 GetClientRect 925->929 930 1400566ba-1400566bd 925->930 926->920 932 140056678-14005667c 927->932 933 140056552-140056557 927->933 928->864 931 1400564e0-1400564e7 928->931 934 1400566e7-1400566ed 929->934 935 1400566ef 929->935 930->885 930->929 937 1400564e9-1400564f0 931->937 938 1400564fb-1400564fe 931->938 932->864 941 140056682-1400566a7 GetClipBox FillRect 932->941 939 140056561 933->939 940 140056559-14005655f 933->940 936 1400566f2-14005670e 934->936 935->936 942 140056754-140056795 MoveWindow InvalidateRect 936->942 943 140056710-140056717 936->943 937->864 944 1400564f6-1400564f9 937->944 945 14005650b-14005651f SetBkColor 938->945 946 140056564-140056572 939->946 940->946 941->883 942->883 947 14005672e-140056735 943->947 948 140056719-140056728 MoveWindow 943->948 944->938 949 140056500-140056505 GetSysColor 944->949 950 140056521-140056524 SetTextColor 945->950 951 14005652a-140056531 945->951 952 1400565d5-1400565fb DrawIconEx 946->952 953 140056574-1400565d3 CreateCompatibleDC SelectObject BitBlt SelectObject DeleteDC 946->953 954 140056737-14005674c MoveWindow 947->954 955 140056752 947->955 948->947 949->945 950->951 951->883 956 140056537-140056540 GetSysColorBrush 951->956 957 140056601-14005664b ExcludeClipRect CreateRectRgn GetClipRgn 952->957 953->957 954->955 955->942 956->883 958 140056656-140056673 FillRgn DeleteObject 957->958 959 14005664d-140056650 GetSysColorBrush 957->959 958->883 959->958
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageRegisterWindow
                          • String ID: $TaskbarCreated
                          • API String ID: 1814269913-2756569325
                          • Opcode ID: ed97b94c7134399663e1d9068011d644069e6277b0a7adf3a647ee4048a9cc57
                          • Instruction ID: 3d2a4659ac04b8fd781bf1f1e5821c7e0ff0b23da157bbf93be823c0ca50bb91
                          • Opcode Fuzzy Hash: ed97b94c7134399663e1d9068011d644069e6277b0a7adf3a647ee4048a9cc57
                          • Instruction Fuzzy Hash: 32227B352046408AEB6ACF67E4447EA77A1F78CBD4F544125EB8A57BB4DF3AD884CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseHandle$CountCreateMutexSleepThreadTick$CodeExitMessagePostmalloc
                          • String ID: 2$AHK Keybd$AHK Mouse$Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function.
                          • API String ID: 2185308758-62447575
                          • Opcode ID: 95632321dcf21f8d64912661292e77c0bb4e2b772ac1b3f787aef32cd86ccbb1
                          • Instruction ID: ebd41942e90c014abbbfa1dfacde388b2bc72a789e1f70ae703de7455ece9b52
                          • Opcode Fuzzy Hash: 95632321dcf21f8d64912661292e77c0bb4e2b772ac1b3f787aef32cd86ccbb1
                          • Instruction Fuzzy Hash: 6EB29BB2214A8085F76ACB26E4143F93BA0F75EB94F484126EB990B7F2DB7DC594C311

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2255 14001efa0-14001efb8 2256 14001f413-14001f41d 2255->2256 2257 14001efbe-14001efc2 2255->2257 2257->2256 2258 14001efc8-14001f0ae call 1400d07d0 call 1400af3c0 GetSystemMetrics call 1400af3c0 LoadCursorW RegisterClassExW 2257->2258 2265 14001f0d7-14001f0f6 call 1400b3f10 2258->2265 2266 14001f0b0-14001f0d5 RegisterClassExW 2258->2266 2273 14001f27f-14001f297 2265->2273 2266->2265 2267 14001f0fb-14001f10c GetForegroundWindow 2266->2267 2270 14001f146 2267->2270 2271 14001f10e-14001f127 GetClassNameW 2267->2271 2272 14001f149-14001f1b5 CreateWindowExW 2270->2272 2274 14001f141-14001f144 2271->2274 2275 14001f129-14001f13f call 1400ca93c 2271->2275 2276 14001f258-14001f275 call 1400b3f10 2272->2276 2277 14001f1bb-14001f1c2 2272->2277 2274->2272 2275->2270 2275->2274 2288 14001f277 2276->2288 2279 14001f201-14001f256 CreateWindowExW 2277->2279 2280 14001f1c4-14001f1eb GetMenu EnableMenuItem 2277->2280 2279->2276 2285 14001f298-14001f39b GetDC GetDeviceCaps MulDiv CreateFontW ReleaseDC SendMessageW * 2 ShowWindow * 2 2279->2285 2283 14001f1fa 2280->2283 2284 14001f1ed-14001f1f5 call 14001f510 2280->2284 2283->2279 2284->2283 2289 14001f3c3-14001f3e3 LoadAcceleratorsW 2285->2289 2290 14001f39d-14001f3bd ShowWindow SetWindowLongW 2285->2290 2288->2273 2291 14001f3e5-14001f3ec 2289->2291 2292 14001f3ee-14001f3f1 call 14001f570 2289->2292 2290->2289 2293 14001f3f6-14001f3fd 2291->2293 2292->2293 2295 14001f409-14001f40e 2293->2295 2296 14001f3ff-14001f404 call 14001f420 2293->2296 2295->2288 2296->2295
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Resource$Window$Load$Create$ClassShow$FindLockMenuMessageMetricsRegisterSendSystem$AcceleratorsCapsCursorDeviceEnableEnumFontForegroundFromIconItemLibraryLongNameNamesReleaseSizeof
                          • String ID: AutoHotkey$AutoHotkey2$Consolas$CreateWindow$Lucida Console$P$RegClass$Shell_TrayWnd$edit
                          • API String ID: 221421807-2636979444
                          • Opcode ID: 9f0a374761176a418978be3c1379a1759a994d3ef96bc3faca75ebb80cc0896e
                          • Instruction ID: 968f40cefe4a0f8d73f4e9c232b4fcd87372d36ebbf80ff45b512957cacca498
                          • Opcode Fuzzy Hash: 9f0a374761176a418978be3c1379a1759a994d3ef96bc3faca75ebb80cc0896e
                          • Instruction Fuzzy Hash: 76C16A35218B8182E7629F22F8547EA73A4F78DB94F540119EB895BBB8DF3DC485CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessageTimerUnlock
                          • String ID: #32770
                          • API String ID: 1115112458-463685578
                          • Opcode ID: 8d79a57e48d1f00ed5f6563233b234499ae9a0473b33bf1b28c5c1886109b93f
                          • Instruction ID: 16e9fd3f2d3deeb1c89529255d5b1a4cf61a1ee717150be675451d4bc97e3919
                          • Opcode Fuzzy Hash: 8d79a57e48d1f00ed5f6563233b234499ae9a0473b33bf1b28c5c1886109b93f
                          • Instruction Fuzzy Hash: E2528FB220468086FB67CB27F8503E93BA1F78DBD8F584115EB4A17AB5DB78C981C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Long$MessageRectSend$free$ClientDragFinishScreenShow
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.$call
                          • API String ID: 1298873099-3963558559
                          • Opcode ID: fa2acf83035d059dc0a20e31c1003e1871f3e2ff2add6a8a4b9890720621b750
                          • Instruction ID: ceb96e6e940a86436d1104c4e662abd7b2f3a10282a9207ffcfeb287d8b57534
                          • Opcode Fuzzy Hash: fa2acf83035d059dc0a20e31c1003e1871f3e2ff2add6a8a4b9890720621b750
                          • Instruction Fuzzy Hash: 9F72BCB2604B848AEB67CF26E4447ED37A9F74CBD8F554225EB4A17BA8DB38C540C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Windowwcsncpy$Message$ClassCurrentDialogDirectoryDragFinishForegroundNameProcessShowThread
                          • String ID: #32770
                          • API String ID: 1745663375-463685578
                          • Opcode ID: fbe917881213136dd4fb58954175c1f166627a5a69082d15888b119d7f3c9d24
                          • Instruction ID: ac4c83e85054edae261d361d87cebb4de6b7dce580e82fabf61456b9cdbc042f
                          • Opcode Fuzzy Hash: fbe917881213136dd4fb58954175c1f166627a5a69082d15888b119d7f3c9d24
                          • Instruction Fuzzy Hash: 32229FB2605A908AFB66CF27B8507EA37A4F78DBD8F544115EB4A17BB4DB34C881C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$EnvironmentVariable_errno_wcstoi64malloc$AllocHeap_callnewh
                          • String ID: $ $Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 2140339802-4280895764
                          • Opcode ID: 0dda79887e691685d1827d9f3bbfdd97369b053485ea394d7e5b11590c395c38
                          • Instruction ID: 57f5015f8bee61cee9e6be7cea576f45fe4fb57a5a88344eb492e33d2ccbf422
                          • Opcode Fuzzy Hash: 0dda79887e691685d1827d9f3bbfdd97369b053485ea394d7e5b11590c395c38
                          • Instruction Fuzzy Hash: 1303DA33200B8486EB669F27D4847E823A5FB4CBD4F594616FB5A57BE9DB34CA81C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4360 14008dc13-14008dc25 4361 14008dc31-14008dc35 4360->4361 4362 14008dc27-14008dc2b 4360->4362 4363 14008dc3b-14008dc3f 4361->4363 4364 14008de21-14008de26 4361->4364 4362->4361 4365 14008dc45-14008dc48 4363->4365 4366 14008ddd6-14008ddda 4363->4366 4367 14008de2f-14008de33 4364->4367 4368 14008de28-14008de2c 4364->4368 4371 14008dc50-14008dc57 4365->4371 4372 14008dd4a-14008dd52 call 1400148f0 4366->4372 4373 14008dde0 4366->4373 4369 14008de39-14008de3c 4367->4369 4370 14008df27-14008df2d 4367->4370 4368->4367 4374 14008de40-14008de47 4369->4374 4376 14008df33-14008df3b 4370->4376 4377 14008daa6-14008dab6 call 14003f1c0 4370->4377 4378 14008dc59-14008dc5d 4371->4378 4379 14008dc5f-14008dc63 4371->4379 4389 14008dd55-14008dd5b 4372->4389 4375 14008dcfa-14008dd0a call 14009e620 4373->4375 4381 14008de49-14008de4d 4374->4381 4382 14008de4f-14008de53 4374->4382 4375->4389 4384 14008df3d-14008df3f 4376->4384 4385 14008df86-14008df94 4376->4385 4378->4379 4386 14008dc65-14008dc6b 4378->4386 4379->4371 4381->4382 4391 14008de55-14008de5b 4381->4391 4382->4374 4384->4377 4392 14008df45-14008df58 GetWindowLongW 4384->4392 4395 14008df9a-14008df9e 4385->4395 4386->4375 4393 14008dc71-14008dc75 4386->4393 4389->4377 4396 14008dd61-14008dd7b SendMessageW 4389->4396 4397 14008df1f 4391->4397 4398 14008de61-14008de65 4391->4398 4399 14008df5a-14008df6c 4392->4399 4400 14008df6e-14008df84 4392->4400 4403 14008dc7d 4393->4403 4404 14008dc77-14008dc7b 4393->4404 4401 14008dfa0-14008dfb0 4395->4401 4402 14008dfd4-14008dfe4 call 1400148f0 4395->4402 4408 14008dd7d-14008dd8f GetWindowLongW 4396->4408 4409 14008dde5-14008ddfc SendMessageW 4396->4409 4413 14008df25 4397->4413 4411 14008de6d 4398->4411 4412 14008de67-14008de6b 4398->4412 4399->4395 4400->4395 4405 14008dfd0-14008dfd2 4401->4405 4406 14008dfb2-14008dfbe SendMessageW 4401->4406 4402->4377 4427 14008dfea-14008dff0 4402->4427 4407 14008dc81-14008dc85 4403->4407 4404->4403 4404->4407 4417 14008e006-14008e010 SendMessageW 4405->4417 4406->4377 4414 14008dfc4-14008dfce 4406->4414 4415 14008dcb2-14008dcb5 4407->4415 4416 14008dc87-14008dc8f 4407->4416 4408->4409 4418 14008dd91-14008ddbb SendMessageW * 2 4408->4418 4409->4377 4421 14008de02-14008de04 4409->4421 4420 14008de71-14008de75 4411->4420 4412->4411 4412->4420 4413->4370 4422 14008e003 4414->4422 4428 14008dcb8-14008dcc4 4415->4428 4423 14008dc91-14008dc95 4416->4423 4424 14008dc97-14008dca2 call 1400cbe84 4416->4424 4417->4377 4430 14008e016 4417->4430 4425 14008d370 4418->4425 4426 14008ddc1-14008ddd1 call 14003f1c0 4418->4426 4431 14008de9f 4420->4431 4432 14008de77-14008de7f 4420->4432 4421->4425 4429 14008de0a-14008de1c call 14009e240 4421->4429 4422->4417 4423->4415 4423->4424 4424->4415 4460 14008dca4-14008dcb0 4424->4460 4434 14008d375-14008d38c 4425->4434 4426->4434 4437 14008dff2-14008e000 4427->4437 4438 14008e018-14008e02a SendMessageW 4427->4438 4439 14008dd26-14008dd2d 4428->4439 4440 14008dcc6-14008dcc9 4428->4440 4429->4425 4441 14008e035-14008e044 4430->4441 4433 14008dea1-14008deac 4431->4433 4442 14008de81-14008de85 4432->4442 4443 14008de87-14008de92 call 1400cbe84 4432->4443 4445 14008deae 4433->4445 4446 14008df00-14008df07 4433->4446 4448 14008d38e-14008d398 4434->4448 4449 14008d3c5-14008d3d6 4434->4449 4437->4422 4438->4441 4456 14008e02c-14008e02f 4438->4456 4451 14008dd2f-14008dd33 4439->4451 4452 14008dd35-14008dd39 4439->4452 4440->4439 4453 14008dccb-14008dccd 4440->4453 4457 14008e062-14008e066 4441->4457 4458 14008e046-14008e05c SendMessageW 4441->4458 4442->4431 4442->4443 4443->4431 4475 14008de94-14008de9d 4443->4475 4459 14008deb0-14008deb3 4445->4459 4463 14008df09-14008df0d 4446->4463 4464 14008df0f-14008df13 4446->4464 4466 14008d39a-14008d3aa call 1400cb13c 4448->4466 4467 14008d3b2-14008d3be 4448->4467 4451->4452 4468 14008dd3b-14008dd3f 4451->4468 4452->4439 4461 14008dccf-14008dcd2 4453->4461 4462 14008dd41-14008dd48 4453->4462 4456->4377 4456->4441 4457->4425 4465 14008e06c-14008e082 4457->4465 4458->4457 4459->4446 4471 14008deb5-14008deb7 4459->4471 4460->4428 4473 14008dcd4-14008dcd7 4461->4473 4474 14008dcf5 4461->4474 4462->4372 4462->4375 4463->4464 4470 14008df15-14008df19 4463->4470 4464->4446 4466->4467 4484 14008d3ac 4466->4484 4467->4449 4468->4462 4468->4474 4470->4397 4477 14008df1b-14008df1d 4470->4477 4476 14008deb9-14008debc 4471->4476 4471->4477 4478 14008dcd9-14008dceb call 1400cc3f4 4473->4478 4479 14008dd0c-14008dd12 4473->4479 4474->4375 4475->4433 4476->4397 4483 14008debe-14008dec1 4476->4483 4477->4397 4477->4413 4481 14008dced-14008dcf0 call 14000c540 4478->4481 4482 14008dd14-14008dd24 4478->4482 4479->4481 4479->4482 4481->4474 4482->4439 4482->4440 4486 14008dee0-14008dee6 4483->4486 4487 14008dec3-14008ded4 call 1400cc3f4 4483->4487 4484->4467 4491 14008ded6-14008dede call 14000c540 4486->4491 4492 14008dee8-14008def8 4486->4492 4487->4491 4487->4492 4491->4397 4492->4459 4495 14008defa 4492->4495 4495->4446
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow$free
                          • String ID: $ $.$.
                          • API String ID: 1598112440-1066414380
                          • Opcode ID: fd62aa58b80f53374e427a652cc2c3eab82498cf0d40e9da887344765f0b4a3c
                          • Instruction ID: cc6138332b581a087be3b47171bcc41f6863d94cd72a7e91ff4e548696034cb5
                          • Opcode Fuzzy Hash: fd62aa58b80f53374e427a652cc2c3eab82498cf0d40e9da887344765f0b4a3c
                          • Instruction Fuzzy Hash: EAD1DD73A0065182FBB65B1791807FA73A1B75C7E0F544323FB664B6F5EB78CA819201
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Thread$FindProcess$CountCurrentForegroundMessagePostTick
                          • String ID: #32768$#32771$N/A
                          • API String ID: 3150702225-2677531976
                          • Opcode ID: 5b4a9aa6d19aa0010d342db14e26c46636d8576c3bcd8934ee5553d32f0ba128
                          • Instruction ID: 8dd71c6cd73de9ed118ba5e4fcbcb27ec43b8ad0ecbe655558bc486dfe15d9fb
                          • Opcode Fuzzy Hash: 5b4a9aa6d19aa0010d342db14e26c46636d8576c3bcd8934ee5553d32f0ba128
                          • Instruction Fuzzy Hash: 0903ADB25086D085E7B6CB2AB450BEA7BA0F79DB98F044106FB8907AF5DB7DC584C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockfreemalloc
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 720627891-457448710
                          • Opcode ID: bf61264f790cd60e724d1da370625378c0c107b99096dbd4d68e545e6213ea06
                          • Instruction ID: ff12dfd61d8369d3650603b1710fa774c31055982588ce79cdc7cf6a64b7ace5
                          • Opcode Fuzzy Hash: bf61264f790cd60e724d1da370625378c0c107b99096dbd4d68e545e6213ea06
                          • Instruction Fuzzy Hash: A222AC32204B448AFB679B27E4543EA67A2E74CBD4F544216FB5A477F9DB38C881C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$free$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64
                          • String ID: D
                          • API String ID: 2580995969-2746444292
                          • Opcode ID: f3e618cd224759c7b04f1d1baedce97249b21c1bc909f3021d13d0b5bde594a6
                          • Instruction ID: 4400769e882c5084145e74d0f5923ae20574630c61ff46fc31f31ea1c9807b8c
                          • Opcode Fuzzy Hash: f3e618cd224759c7b04f1d1baedce97249b21c1bc909f3021d13d0b5bde594a6
                          • Instruction Fuzzy Hash: 12226B32604B4489FB678B67E4807EE67A1F78DBD8F540116EB8A57BB5DB38C881C740
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Parameter #2 invalid.$Parameter #3 invalid.$Read
                          • API String ID: 0-931347957
                          • Opcode ID: cc8b20cf1deaa334da9c8206cf85cc3d40d1535b170f9373f879e6d6891cd2a3
                          • Instruction ID: 36d599cfc14d6426794a22b6529d008cb789eb4799f93c48a41af0f078bbb943
                          • Opcode Fuzzy Hash: cc8b20cf1deaa334da9c8206cf85cc3d40d1535b170f9373f879e6d6891cd2a3
                          • Instruction Fuzzy Hash: C4225B72605B5489FB678B2BE8403EE27A1F74DBD4F584126EF49576B8DB38C881C740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 6960 14008cc40-14008cca4 call 14008bac0 call 14008b340 6965 14008ccc0-14008ccc3 6960->6965 6966 14008cca6-14008ccbf call 14003f1c0 6960->6966 6965->6966 6968 14008ccc5-14008ccd7 call 14009b300 6965->6968 6968->6966 6972 14008ccd9-14008cd0f 6968->6972 6973 14008cd11-14008cd2d call 1400b1500 6972->6973 6974 14008cd32-14008cd3d 6972->6974 6980 14008cf73-14008cfa9 6973->6980 6976 14008cd3f-14008cd46 6974->6976 6977 14008cd48 6974->6977 6979 14008cd4e-14008cd58 6976->6979 6977->6979 6981 14008cd6a-14008cd74 6979->6981 6982 14008cd5a-14008cd65 call 140006090 6979->6982 6985 14008d55a-14008d56b call 14009e5d0 6980->6985 6986 14008cfaf-14008cfc0 6980->6986 6983 14008cd9b-14008cd9f 6981->6983 6984 14008cd76-14008cd7a 6981->6984 6993 14008cf6c 6982->6993 6990 14008cdb1-14008cdb7 6983->6990 6991 14008cda1-14008cdac call 1400b1bb0 6983->6991 6984->6983 6989 14008cd7c-14008cd96 call 140040760 6984->6989 7006 14008d370 6985->7006 7007 14008d571-14008d57c IsWindowVisible 6985->7007 6998 14008cfc5-14008cfc8 6986->6998 6989->6993 6996 14008cdb9-14008cdc7 6990->6996 6997 14008cdce-14008cdd9 6990->6997 6991->6993 6993->6980 6996->6997 7004 14008cddf-14008cdec 6997->7004 7005 14008cf47-14008cf4e 6997->7005 7002 14008cfca-14008cfdd 6998->7002 7003 14008cfdf-14008cfe5 6998->7003 7008 14008cfe8-14008d00a call 140040760 7002->7008 7003->7008 7009 14008cdee-14008cdf0 7004->7009 7010 14008ce01-14008ce09 7004->7010 7013 14008cf5c-14008cf68 7005->7013 7014 14008cf50-14008cf57 call 1400cb300 7005->7014 7012 14008d375-14008d38c 7006->7012 7007->7006 7011 14008d582-14008da8f GetWindowRect MapWindowPoints InvalidateRect 7007->7011 7008->6993 7017 14008ce3e-14008ce42 7009->7017 7018 14008cdf2-14008cdfc 7009->7018 7010->7017 7020 14008ce0b-14008ce0f 7010->7020 7011->7012 7021 14008d38e-14008d398 7012->7021 7022 14008d3c5-14008d3d6 7012->7022 7013->6993 7014->7013 7030 14008ce4e-14008ce56 7017->7030 7031 14008ce44-14008ce49 7017->7031 7025 14008cf39-14008cf45 7018->7025 7026 14008ce11-14008ce16 7020->7026 7027 14008ce18-14008ce20 7020->7027 7028 14008d39a-14008d3aa call 1400cb13c 7021->7028 7029 14008d3b2-14008d3be 7021->7029 7025->7005 7032 14008ce24-14008ce2f call 1400aa420 7026->7032 7027->7032 7028->7029 7045 14008d3ac 7028->7045 7029->7022 7034 14008cef8-14008cf03 7030->7034 7035 14008ce5c-14008ce63 7030->7035 7031->7034 7032->6993 7055 14008ce35-14008ce39 7032->7055 7038 14008cf05-14008cf08 7034->7038 7039 14008cf18 7034->7039 7040 14008ceb4-14008cebb 7035->7040 7041 14008ce65-14008ce71 7035->7041 7038->7039 7046 14008cf0a-14008cf16 call 1400cb13c 7038->7046 7047 14008cf1b-14008cf1e 7039->7047 7042 14008cebd-14008cec4 7040->7042 7043 14008cec6-14008cecd 7040->7043 7048 14008ce7b-14008ce91 7041->7048 7049 14008ce73 7041->7049 7042->7034 7053 14008cecf-14008ceef 7043->7053 7054 14008cef1 7043->7054 7045->7029 7046->7047 7047->6998 7050 14008cf24-14008cf2f call 1400ca9c4 7047->7050 7051 14008ceaa-14008ceb2 7048->7051 7052 14008ce93-14008ce9b 7048->7052 7049->7048 7050->6998 7061 14008cf35 7050->7061 7051->7034 7052->7051 7058 14008ce9d-14008cea7 7052->7058 7053->7034 7054->7034 7055->7025 7058->7051 7061->7025
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 0-457448710
                          • Opcode ID: 89a0caea1eab7b6beca6f571fbf325c0edfb23a653834274bbe48ca9277849e7
                          • Instruction ID: 074b38775acdacbdc82bd2ad2d4d60bec432faf98f35cfc34457522a579d5dc2
                          • Opcode Fuzzy Hash: 89a0caea1eab7b6beca6f571fbf325c0edfb23a653834274bbe48ca9277849e7
                          • Instruction Fuzzy Hash: 89D1BD73214B8492FA26CB27E540BEA67B5F74CBD4F444126EB5E07BB1DB38C6988301
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: DiskFreeSpacewcsncpy
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.$\
                          • API String ID: 340609953-3887087261
                          • Opcode ID: 71b04bfdc7b4cd12e3b8d48ec5821eecdc7a48df8202bceb7eb89fb8fe4855a2
                          • Instruction ID: b5b8dbeab608ca898f4adede869faa9a51234a4995db989feeb7c27570bb5004
                          • Opcode Fuzzy Hash: 71b04bfdc7b4cd12e3b8d48ec5821eecdc7a48df8202bceb7eb89fb8fe4855a2
                          • Instruction Fuzzy Hash: E1A1EC72604A8092FB62DB23E5443E963A1F78CBD4F444222EB5A1BBF5DB7DC595E300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: wcsncpy$DiskFreeLabelSpaceVolume
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 1259151110-457448710
                          • Opcode ID: ef8eb696887442c26a250a69b5b24b7021a3409faf14755e967f7645dd04f815
                          • Instruction ID: 5b4773f5052d41ad3a843d59e822fd75f2ddfba64960bf841d1105ff295ef05f
                          • Opcode Fuzzy Hash: ef8eb696887442c26a250a69b5b24b7021a3409faf14755e967f7645dd04f815
                          • Instruction Fuzzy Hash: 7CC10172604A8080EB23DB26D5043EA6392E74DBE8F544212EF6E177F9DA7DC885E341
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Resource$FindInfoLoadLockSizeofmalloc
                          • String ID: >AUTOHOTKEY SCRIPT<$Could not extract script from EXE.
                          • API String ID: 3366556718-1775548002
                          • Opcode ID: ef98bff5aa7d435201c18f3eb189dd4f9da39287e8fa21729a5de6f8cbcc251b
                          • Instruction ID: 4ca7666f5d533042d4ca9a9cad77b3cddb827c80f71eef5efff0dddd3ba21b57
                          • Opcode Fuzzy Hash: ef98bff5aa7d435201c18f3eb189dd4f9da39287e8fa21729a5de6f8cbcc251b
                          • Instruction Fuzzy Hash: 10317A31209B4481EB668B56F45439AA3A1F74CBD8F084529EF8D0BBBADF7DC444CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 0-457448710
                          • Opcode ID: ec625c177218240336f4128e0fd53bb405de22a602e7cd4e6c40f3e5613b8200
                          • Instruction ID: 3e96e052869feba40ea8a328970eef181d505f1103777d5259ceaf2027e25bf8
                          • Opcode Fuzzy Hash: ec625c177218240336f4128e0fd53bb405de22a602e7cd4e6c40f3e5613b8200
                          • Instruction Fuzzy Hash: 3642ED73200B8086EB26DF2AD4447ED77A5F74CBD8F094626EB5A4BBA5DB34C681C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: f833d4a0713a5c8d6de575c904e800df0c91a906833fd943bef45137d0ba8481
                          • Instruction ID: 869df9760f0148c9f829586e4073e97515fd48e62f034122f43eef2aed448627
                          • Opcode Fuzzy Hash: f833d4a0713a5c8d6de575c904e800df0c91a906833fd943bef45137d0ba8481
                          • Instruction Fuzzy Hash: A251AD32304B8491EE169B16D5483DAB3A9FB58BE4F958316EB69077E4DF38C58AC700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Heap$CreateInformationVersion
                          • String ID:
                          • API String ID: 3563531100-0
                          • Opcode ID: 2aae9347a45451b879d68f4c96062e5d6e9eb486b1f21193dd6ae4d59cce5ed9
                          • Instruction ID: da4e4383b9ef4f05b0bc2872ceacfce4d983aefa46e52d53b2cc2322927a9f3f
                          • Opcode Fuzzy Hash: 2aae9347a45451b879d68f4c96062e5d6e9eb486b1f21193dd6ae4d59cce5ed9
                          • Instruction Fuzzy Hash: 49E09274221B4082FB8A5B53E845BE52261F78C780F800414FB4A03B74DF3CC49A8700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3158 14008d799-14008d7aa 3159 14008d7b0-14008d7b9 3158->3159 3160 14008d8b7-14008d918 GetWindowRect GetParent ScreenToClient 3158->3160 3163 14008d7c0-14008d7d1 call 14000c540 3159->3163 3161 14008d91a-14008d922 3160->3161 3162 14008d924 3160->3162 3164 14008d927-14008d92e 3161->3164 3162->3164 3170 14008d875-14008d888 call 1400cbb8c 3163->3170 3171 14008d7d7-14008d7da 3163->3171 3166 14008d93c 3164->3166 3167 14008d930-14008d93a 3164->3167 3169 14008d93f-14008d956 MoveWindow 3166->3169 3167->3169 3172 14008d95c-14008d967 3169->3172 3173 14008daa6-14008dab6 call 14003f1c0 3169->3173 3186 14008d88a-14008d89e MulDiv 3170->3186 3187 14008d8a1-14008d8ac 3170->3187 3175 14008d7dc-14008d7de 3171->3175 3176 14008d847-14008d85a call 1400cbb8c 3171->3176 3180 14008d96d-14008d9a4 SendMessageW * 2 3172->3180 3181 14008d9f1-14008d9f3 3172->3181 3177 14008d81b-14008d82d call 1400cbb8c 3175->3177 3178 14008d7e0-14008d7e2 3175->3178 3176->3187 3200 14008d85c-14008d873 MulDiv 3176->3200 3177->3187 3207 14008d82f-14008d845 MulDiv 3177->3207 3178->3187 3188 14008d7e8-14008d7fa call 1400cbb8c 3178->3188 3191 14008d9a6-14008d9c2 SendMessageW InvalidateRect 3180->3191 3192 14008d9c8-14008d9cb 3180->3192 3184 14008d9f5-14008da24 GetPropW 3181->3184 3185 14008da47-14008da4b 3181->3185 3184->3185 3194 14008da26-14008da34 3184->3194 3197 14008d370 3185->3197 3198 14008da51-14008da8f GetWindowRect MapWindowPoints InvalidateRect 3185->3198 3186->3187 3187->3163 3195 14008d8b2 3187->3195 3188->3187 3208 14008d800-14008d816 MulDiv 3188->3208 3191->3192 3192->3185 3201 14008d9cd-14008d9ef SendMessageW InvalidateRect 3192->3201 3202 14008da41 RemovePropW 3194->3202 3203 14008da36-14008da3f SetPropW 3194->3203 3195->3160 3205 14008d375-14008d38c 3197->3205 3198->3205 3200->3187 3201->3185 3202->3185 3203->3185 3209 14008d38e-14008d398 3205->3209 3210 14008d3c5-14008d3d6 3205->3210 3207->3187 3208->3187 3211 14008d39a-14008d3aa call 1400cb13c 3209->3211 3212 14008d3b2-14008d3be 3209->3212 3211->3212 3215 14008d3ac 3211->3215 3212->3210 3215->3212
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Rect$MessageSendWindow$InvalidateProp$ClientMoveParentPointsRemoveScreen
                          • String ID: ahk_autosize
                          • API String ID: 462237319-1503521729
                          • Opcode ID: b601c7de6dedbd7fb826202e556cc7be934b9b59026d3858fd59f61cdc72d930
                          • Instruction ID: 037a1466b1b07974fdbece3a2500a3dc170e1672c91d0b763394c1f01996b9fe
                          • Opcode Fuzzy Hash: b601c7de6dedbd7fb826202e556cc7be934b9b59026d3858fd59f61cdc72d930
                          • Instruction Fuzzy Hash: E6910E3670464086FB669B27E4447AA77A1F38CBD4F184116FF8A47BB4DE3DC9848B80

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4202 14008c160-14008c1b5 call 14008bac0 4205 14008c1d5-14008c1e6 call 14008b0d0 4202->4205 4206 14008c1b7-14008c1bc 4202->4206 4212 14008c1ff-14008c22f 4205->4212 4213 14008c1e8-14008c1fa call 140040760 4205->4213 4206->4205 4207 14008c1be-14008c1d0 call 140040760 4206->4207 4214 14008cbcf-14008cbec 4207->4214 4216 14008c35c-14008c36d call 1400ca93c 4212->4216 4217 14008c235-14008c238 4212->4217 4213->4214 4232 14008c38b-14008c38e 4216->4232 4233 14008c36f-14008c372 4216->4233 4220 14008c23e-14008c241 4217->4220 4221 14008c343-14008c346 4217->4221 4225 14008c27c-14008c27f 4220->4225 4226 14008c243-14008c246 4220->4226 4222 14008cb8b-14008cb93 4221->4222 4223 14008c34c-14008c357 call 14008f4f0 4221->4223 4228 14008cbcc 4222->4228 4229 14008cb95-14008cb9f 4222->4229 4223->4222 4230 14008c30b-14008c319 4225->4230 4231 14008c285-14008c28c 4225->4231 4226->4232 4234 14008c24c-14008c25a call 1400cb634 4226->4234 4228->4214 4236 14008cbb9-14008cbc5 4229->4236 4237 14008cba1-14008cbb1 call 1400cb13c 4229->4237 4242 14008c31b-14008c31e 4230->4242 4243 14008c337-14008c33e 4230->4243 4238 14008c28e-14008c2a2 call 1400ca9c4 4231->4238 4239 14008c2a8-14008c2ba call 1400cbd60 4231->4239 4244 14008c394-14008c397 4232->4244 4245 14008c4e6-14008c4e9 4232->4245 4240 14008c374 4233->4240 4241 14008c378-14008c386 4233->4241 4256 14008c25c-14008c25f 4234->4256 4257 14008c272-14008c277 4234->4257 4236->4228 4237->4236 4273 14008cbb3 4237->4273 4238->4239 4276 14008c4c3-14008c4e1 call 140040760 4238->4276 4278 14008c2c9 4239->4278 4279 14008c2bc-14008c2c7 call 14008b950 4239->4279 4240->4241 4241->4222 4242->4243 4251 14008c320-14008c330 call 1400cb13c call 1400cb134 4242->4251 4243->4222 4253 14008c399-14008c39c 4244->4253 4254 14008c3ab-14008c3b7 4244->4254 4247 14008c4eb-14008c4f1 4245->4247 4248 14008c4f5-14008c506 4245->4248 4247->4248 4258 14008c52f-14008c534 4248->4258 4259 14008c508-14008c529 call 140093f10 4248->4259 4251->4243 4253->4222 4264 14008c3a2-14008c3a5 4253->4264 4265 14008c3b9-14008c3be 4254->4265 4266 14008c3ee-14008c3f5 4254->4266 4256->4254 4269 14008c265-14008c26d call 14008f4f0 4256->4269 4257->4254 4274 14008c56d-14008c577 4258->4274 4275 14008c536-14008c539 call 14008f820 4258->4275 4259->4258 4298 14008cb88 4259->4298 4264->4222 4264->4254 4267 14008c3c0 4265->4267 4268 14008c3c5-14008c3db call 1400cbba4 4265->4268 4271 14008c411-14008c423 call 1400cbd60 4266->4271 4272 14008c3f7-14008c40b call 1400ca9c4 4266->4272 4267->4268 4268->4298 4307 14008c3e1-14008c3e8 4268->4307 4269->4254 4309 14008c432 4271->4309 4310 14008c425-14008c430 call 14008b950 4271->4310 4272->4271 4272->4276 4273->4236 4287 14008c579-14008c580 4274->4287 4288 14008c5a6-14008c5ae 4274->4288 4300 14008c53e-14008c540 4275->4300 4276->4222 4280 14008c2cc-14008c2cf 4278->4280 4279->4280 4280->4276 4293 14008c2d5-14008c2ed call 1400ca9c4 4280->4293 4294 14008c59f-14008c5a2 4287->4294 4295 14008c582-14008c586 4287->4295 4301 14008c5c0-14008c5c3 4288->4301 4302 14008c5b0-14008c5b9 call 1400b0330 4288->4302 4326 14008c4bb-14008c4be call 1400cb134 4293->4326 4327 14008c2f3-14008c306 call 1400cb300 4293->4327 4294->4288 4295->4294 4311 14008c588-14008c598 call 1400cb13c call 1400cb134 4295->4311 4298->4222 4300->4274 4308 14008c542-14008c568 call 14008f4f0 call 140040760 4300->4308 4313 14008c640-14008c646 4301->4313 4314 14008c5c5-14008c5ca 4301->4314 4302->4301 4307->4266 4308->4222 4315 14008c435-14008c438 4309->4315 4310->4315 4311->4294 4313->4298 4321 14008c64c-14008c65c 4313->4321 4322 14008c5cc-14008c5d0 4314->4322 4323 14008c5d7-14008c5df 4314->4323 4315->4276 4330 14008c43e-14008c452 call 1400ca9c4 4315->4330 4321->4298 4322->4323 4324 14008c61b-14008c61e 4323->4324 4325 14008c5e1-14008c5e8 4323->4325 4324->4222 4337 14008c624-14008c628 4324->4337 4332 14008c5ea-14008c5ee 4325->4332 4333 14008c608-14008c60c 4325->4333 4326->4276 4327->4230 4330->4326 4349 14008c454-14008c471 call 1400ca9c4 4330->4349 4332->4333 4340 14008c5f0-14008c601 call 1400cb13c call 1400cb134 4332->4340 4342 14008c60e-14008c615 4333->4342 4343 14008c617 4333->4343 4337->4222 4344 14008c62e-14008c63b SetWindowTextW 4337->4344 4340->4333 4342->4324 4343->4324 4344->4222 4355 14008c4b3-14008c4b6 call 1400cb13c 4349->4355 4356 14008c473-14008c4b1 call 1400cb300 4349->4356 4355->4326 4356->4245
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc
                          • String ID: +LastFoundExist$Could not create window.$Invalid Gui name.$Out of memory.$Parameter #1 invalid.
                          • API String ID: 2803490479-3585094845
                          • Opcode ID: 486b98836fe05cae98d1368e33ed66b86a2cc682dbf9238001beeec0f8349e49
                          • Instruction ID: 4653871446c5d13017409fdd587a9e3dac0e7c3ce0b6be9add1e22e2c0005e97
                          • Opcode Fuzzy Hash: 486b98836fe05cae98d1368e33ed66b86a2cc682dbf9238001beeec0f8349e49
                          • Instruction Fuzzy Hash: ADE18A72215B4581EA5BDF17A490BE923B4F78DBD4F484425EB4A0B7B6EF38CA498300

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4497 14005fb38-14005fb3f 4498 14005fb41-14005fb46 4497->4498 4499 14005fb4b-14005fb5c call 1400ca93c 4497->4499 4500 14005fbdd-14005fbed 4498->4500 4506 14005fb63-14005fb74 call 1400ca93c 4499->4506 4507 14005fb5e-14005fb61 4499->4507 4502 14005fbf0-14005fc10 GetDriveTypeW 4500->4502 4504 14005fc12-14005fc18 4502->4504 4505 14005fc1f-14005fc2a 4502->4505 4508 14005fc2f-14005fc36 4504->4508 4509 14005fc1a-14005fc1d 4504->4509 4505->4508 4513 14005fb76-14005fb79 4506->4513 4514 14005fb7b-14005fb8c call 1400ca93c 4506->4514 4507->4500 4508->4502 4511 14005fc38-14005fc4f 4508->4511 4509->4505 4509->4508 4515 14005fc51-14005fc6b call 1400b1500 4511->4515 4516 14005fc70-14005fc79 4511->4516 4513->4500 4524 14005fb93-14005fba4 call 1400ca93c 4514->4524 4525 14005fb8e-14005fb91 4514->4525 4526 14005fec5-14005fecb 4515->4526 4519 14005fc84-14005fc95 4516->4519 4520 14005fc7b-14005fc82 4516->4520 4523 14005fc99-14005fca4 4519->4523 4520->4523 4527 14005fca6-14005fcb3 call 140006090 4523->4527 4528 14005fcb8-14005fcc2 4523->4528 4545 14005fba6-14005fba9 4524->4545 4546 14005fbab-14005fbbc call 1400ca93c 4524->4546 4525->4500 4533 1400604d3-1400604e8 4526->4533 4534 14005fed1-14005fedf call 14003f1c0 4526->4534 4527->4526 4530 14005fcc4-14005fcc8 4528->4530 4531 14005fce9-14005fced 4528->4531 4530->4531 4538 14005fcca-14005fce4 call 140040760 4530->4538 4540 14005fd03-14005fd09 4531->4540 4541 14005fcef-14005fcfe call 1400b1bb0 4531->4541 4536 1400604f2-14006050f 4533->4536 4537 1400604ed call 1400b1500 4533->4537 4534->4536 4537->4536 4538->4526 4548 14005fd20-14005fd2b 4540->4548 4549 14005fd0b-14005fd19 4540->4549 4541->4526 4545->4500 4565 14005fbc3-14005fbd4 call 1400ca93c 4546->4565 4566 14005fbbe-14005fbc1 4546->4566 4550 14005fe96-14005fea2 4548->4550 4551 14005fd31-14005fd3e 4548->4551 4549->4548 4557 14005fea4-14005feae call 1400cb300 4550->4557 4558 14005feb3-14005fec1 4550->4558 4555 14005fd57-14005fd5e 4551->4555 4556 14005fd40-14005fd42 4551->4556 4561 14005fd97-14005fd9b 4555->4561 4563 14005fd60-14005fd64 4555->4563 4556->4561 4562 14005fd44-14005fd52 4556->4562 4557->4558 4558->4526 4570 14005fda7-14005fdaf 4561->4570 4571 14005fd9d-14005fda2 4561->4571 4567 14005fe8a-14005fe92 4562->4567 4568 14005fd66-14005fd6b 4563->4568 4569 14005fd6d-14005fd7a 4563->4569 4565->4534 4577 14005fbda 4565->4577 4566->4500 4567->4550 4573 14005fd7d-14005fd88 call 1400aa420 4568->4573 4569->4573 4574 14005fe51-14005fe5c 4570->4574 4576 14005fdb5-14005fdbc 4570->4576 4571->4574 4573->4526 4596 14005fd8e-14005fd92 4573->4596 4579 14005fe71 4574->4579 4580 14005fe5e-14005fe61 4574->4580 4581 14005fdbe-14005fdca 4576->4581 4582 14005fe0d-14005fe14 4576->4582 4577->4500 4583 14005fe74-14005fe77 4579->4583 4580->4579 4589 14005fe63-14005fe6f call 1400cb13c 4580->4589 4584 14005fdd4-14005fdea 4581->4584 4585 14005fdcc 4581->4585 4586 14005fe16-14005fe1d 4582->4586 4587 14005fe1f-14005fe26 4582->4587 4590 14005fee4-14005fee7 4583->4590 4591 14005fe79-14005fe84 call 1400ca9c4 4583->4591 4592 14005fe03-14005fe0b 4584->4592 4593 14005fdec-14005fdf4 4584->4593 4585->4584 4586->4574 4594 14005fe28-14005fe48 4587->4594 4595 14005fe4a 4587->4595 4589->4583 4600 14005fefa-14005fefe 4590->4600 4601 14005fee9-14005fef8 4590->4601 4591->4590 4605 14005fe86 4591->4605 4592->4574 4593->4592 4598 14005fdf6-14005fe00 4593->4598 4594->4574 4595->4574 4596->4567 4598->4592 4604 14005ff02-14005ff20 call 140040760 4600->4604 4601->4604 4604->4526 4604->4533 4605->4567
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: DriveType
                          • String ID: :$CDRom$Fixed$Memory limit reached (see #MaxMem in the help file).$Network$Out of memory.$Ramdisk$Removable$Unknown
                          • API String ID: 338552980-2953544393
                          • Opcode ID: bb833965e3754fa2962615362b463c880df79ab3a91169e8f50284473f212ba2
                          • Instruction ID: bbf34e767e68d7ef8d97e59398adae0a59f392d3417194732dc83bf96972dd95
                          • Opcode Fuzzy Hash: bb833965e3754fa2962615362b463c880df79ab3a91169e8f50284473f212ba2
                          • Instruction Fuzzy Hash: F7C1CC72604B8481FB23DB22D5153F963A2E74DBD8F814212EB5A176FADB7EC845E340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4608 140005660-140005682 4609 1400056c3-1400056c6 4608->4609 4610 140005684-14000568e 4608->4610 4613 140005741-140005748 4609->4613 4614 1400056c8-1400056cf 4609->4614 4611 1400056b7-1400056c1 4610->4611 4612 140005690-140005696 4610->4612 4611->4614 4612->4611 4615 140005698-14000569f 4612->4615 4616 1400057ec 4613->4616 4617 14000574e-140005768 FindWindowW 4613->4617 4614->4617 4618 1400056d1-1400056d8 4614->4618 4615->4611 4619 1400056a1-1400056a8 4615->4619 4622 1400057f1-140005805 4616->4622 4617->4616 4620 14000576e 4617->4620 4618->4616 4621 1400056de-1400056f8 FindWindowW 4618->4621 4619->4611 4623 1400056aa-1400056b1 4619->4623 4624 140005773-14000579e PostMessageW Sleep IsWindow 4620->4624 4621->4613 4625 1400056fa-140005703 4621->4625 4623->4611 4623->4613 4626 1400057e1-1400057e6 Sleep 4624->4626 4627 1400057a0-1400057a3 4624->4627 4628 140005705-14000570a 4625->4628 4629 14000570f-140005712 4625->4629 4626->4616 4630 1400057a5-1400057c3 call 1400b3f10 4627->4630 4631 1400057c7-1400057df Sleep IsWindow 4627->4631 4628->4622 4632 140005714-140005738 call 1400b3f10 4629->4632 4633 14000573a-14000573f 4629->4633 4638 1400057c5 4630->4638 4639 140005806-140005808 4630->4639 4631->4626 4631->4627 4632->4628 4632->4633 4633->4624 4638->4631 4639->4622
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Sleep$Find$MessagePost
                          • String ID: An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Could not close the previous instance of this script. Keep waiting?$d
                          • API String ID: 1104075879-823662016
                          • Opcode ID: 9be76a8b86065992f11beeb97ac03ba929bd344f95d33b48398e52f44b7c9567
                          • Instruction ID: f46e981cd836c53c074747acff47b3a235bc4a799830d710d07ea1a2ac91e491
                          • Opcode Fuzzy Hash: 9be76a8b86065992f11beeb97ac03ba929bd344f95d33b48398e52f44b7c9567
                          • Instruction Fuzzy Hash: 63415CB0608A51C2FA67EB23F8403EA22A0F74EBD5F540126FB49976B4DB39C8819741

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5480 1400af3c0-1400af3eb 5481 1400af3ed-1400af3fc LoadLibraryExW 5480->5481 5482 1400af3fe 5480->5482 5483 1400af405-1400af408 5481->5483 5482->5483 5484 1400af5ce-1400af5d1 5483->5484 5485 1400af40e-1400af420 5483->5485 5488 1400af5da-1400af5de 5484->5488 5489 1400af5d3-1400af5d8 5484->5489 5486 1400af42e-1400af461 EnumResourceNamesW 5485->5486 5487 1400af422-1400af42c 5485->5487 5490 1400af466-1400af469 5486->5490 5487->5490 5491 1400af5e2-1400af5ea ExtractIconW 5488->5491 5489->5491 5493 1400af46f-1400af481 FindResourceW 5490->5493 5494 1400af597-1400af5aa 5490->5494 5492 1400af5f0-1400af609 5491->5492 5493->5494 5495 1400af487-1400af496 LoadResource 5493->5495 5496 1400af5ac-1400af5af 5494->5496 5497 1400af5b6-1400af5b9 5494->5497 5495->5494 5498 1400af49c-1400af4ab LockResource 5495->5498 5496->5497 5499 1400af5b1-1400af5b4 5496->5499 5500 1400af5bb-1400af5be FreeLibrary 5497->5500 5501 1400af5c4-1400af5c7 5497->5501 5498->5494 5502 1400af4b1-1400af4ba 5498->5502 5499->5501 5500->5501 5501->5484 5503 1400af5c9-1400af5cc 5501->5503 5504 1400af4bc-1400af4c5 GetSystemMetrics 5502->5504 5505 1400af4c7-1400af4d7 5502->5505 5503->5492 5504->5505 5505->5494 5506 1400af4dd-1400af4e8 5505->5506 5507 1400af4f0-1400af4fe 5506->5507 5508 1400af500-1400af506 5507->5508 5509 1400af508-1400af50a 5507->5509 5510 1400af50d-1400af50f 5508->5510 5509->5510 5511 1400af511-1400af514 5510->5511 5512 1400af517-1400af522 5510->5512 5511->5512 5512->5507 5513 1400af524-1400af527 5512->5513 5513->5494 5514 1400af529-1400af541 FindResourceW 5513->5514 5514->5494 5515 1400af543-1400af552 LoadResource 5514->5515 5515->5494 5516 1400af554-1400af563 LockResource 5515->5516 5516->5494 5517 1400af565-1400af594 SizeofResource CreateIconFromResourceEx 5516->5517 5517->5494
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Resource$Load$FindIconLock$CreateEnumExtractFromLibraryMetricsNamesSizeofSystem
                          • String ID:
                          • API String ID: 1568753105-0
                          • Opcode ID: 33d089be9ebdc0d64a94b64a1d3b0a3a67a64df8bae5bc6057e580e510e08665
                          • Instruction ID: 9a0abc6b989a2079d1a8385865f242b4ed64abd64c1c020e43650a27a5f9203e
                          • Opcode Fuzzy Hash: 33d089be9ebdc0d64a94b64a1d3b0a3a67a64df8bae5bc6057e580e510e08665
                          • Instruction Fuzzy Hash: 5951C731701B5086EA6A8FA3A4447F96790BB5CBD4F584625EF4A5BBA4DF3CC881DB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5518 14009cb0c-14009cb1a call 14008bf70 5521 14009cdda 5518->5521 5522 14009cb20-14009cb31 call 1400019f0 5518->5522 5523 14009cde1-14009cded DefDlgProcW 5521->5523 5522->5521 5527 14009cb37-14009cb3d 5522->5527 5525 14009cdf3-14009ce1b 5523->5525 5527->5521 5529 14009cb43-14009cb45 5527->5529 5530 14009cb57-14009cb62 GetSysColor 5529->5530 5531 14009cb47-14009cb50 5529->5531 5533 14009cb64-14009cb74 SetTextColor 5530->5533 5531->5530 5532 14009cb52-14009cb55 5531->5532 5532->5533 5534 14009cbac-14009cbaf 5533->5534 5535 14009cb76-14009cb7c 5533->5535 5536 14009cbb1-14009cbb4 5534->5536 5537 14009cbc6-14009cbd4 5534->5537 5538 14009cb8e-14009cba7 SetBkMode GetStockObject 5535->5538 5539 14009cb7e-14009cb80 5535->5539 5536->5521 5540 14009cbba-14009cbc4 5536->5540 5541 14009cc0a-14009cc12 5537->5541 5542 14009cbd6-14009cbe9 call 14009e110 5537->5542 5538->5525 5539->5534 5543 14009cb82-14009cb84 5539->5543 5544 14009cc3f 5540->5544 5546 14009cc2f-14009cc32 5541->5546 5547 14009cc14-14009cc2a SetBkColor 5541->5547 5542->5546 5554 14009cbeb-14009cbed 5542->5554 5543->5534 5548 14009cb86-14009cb88 5543->5548 5551 14009cc41-14009cc62 GetSysColor SetBkColor GetSysColorBrush 5544->5551 5552 14009cc67-14009cc88 GetSysColor SetBkColor GetSysColorBrush 5544->5552 5546->5523 5550 14009cc38 5546->5550 5547->5525 5548->5534 5553 14009cb8a-14009cb8c 5548->5553 5550->5544 5551->5525 5552->5521 5552->5525 5553->5534 5553->5538 5554->5546 5555 14009cbef-14009cc05 SetBkColor 5554->5555 5555->5525
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Color$BrushCtrl$ModeObjectParentProcStockText
                          • String ID:
                          • API String ID: 1742339300-0
                          • Opcode ID: 6c153e14ce2cf73ed71101b4a5e58e47291108c03603d0b82cdf13b9b04df687
                          • Instruction ID: 4cb78754297a14358eaf308956e5994465693a1a95030f18608aa82933eac399
                          • Opcode Fuzzy Hash: 6c153e14ce2cf73ed71101b4a5e58e47291108c03603d0b82cdf13b9b04df687
                          • Instruction Fuzzy Hash: ED4171B1A1168082FAAB57279428BE962A1FB8DBD5F444415FF5A177F5CF388C86C340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5556 14001f780-14001f7ab call 1400ca9c4 5559 14001f7b3-14001f807 call 1400cb300 SetTimer 5556->5559 5560 14001f7ad-14001f7b2 5556->5560 5563 14001f816-14001f848 GetTickCount 5559->5563 5564 14001f809-14001f811 5559->5564 5566 14001f871-14001f8a4 GetTickCount call 140032530 5563->5566 5567 14001f84a-14001f86a SetTimer 5563->5567 5565 14001f8e5-14001f8f3 5564->5565 5568 14001f8f5-14001f900 5565->5568 5569 14001f93a-14001f9ec call 1400cb300 5565->5569 5574 14001f8a9-14001f8b9 5566->5574 5567->5566 5571 14001f902-14001f905 5568->5571 5572 14001f90b-14001f919 5568->5572 5582 14001f9ee-14001fa0a call 1400b1500 5569->5582 5583 14001fa0f-14001fa1f 5569->5583 5571->5572 5575 14001f91b call 1400cb13c 5572->5575 5576 14001f920-14001f933 call 1400cb134 5572->5576 5578 14001f8bb-14001f8d8 KillTimer 5574->5578 5579 14001f8de 5574->5579 5575->5576 5576->5569 5578->5579 5579->5565 5591 14001fc53-14001fc6f 5582->5591 5584 14001fa21-14001fa25 5583->5584 5585 14001fa28-14001fa33 5583->5585 5584->5585 5588 14001fa45-14001fa4f 5585->5588 5589 14001fa35-14001fa40 call 140006090 5585->5589 5593 14001fa51-14001fa55 5588->5593 5594 14001fa76-14001fa7a 5588->5594 5601 14001fc4e 5589->5601 5593->5594 5596 14001fa57-14001fa71 call 140040760 5593->5596 5597 14001fa7c-14001fa8b call 1400b1bb0 5594->5597 5598 14001fa90-14001fa96 5594->5598 5596->5601 5597->5601 5599 14001fa98-14001faa6 5598->5599 5600 14001faad-14001fabd 5598->5600 5599->5600 5604 14001fc21-14001fc28 5600->5604 5605 14001fac3-14001fad0 5600->5605 5601->5591 5611 14001fc37-14001fc45 5604->5611 5612 14001fc2a-14001fc32 call 1400cb300 5604->5612 5609 14001fad2-14001fad4 5605->5609 5610 14001fae5-14001faed 5605->5610 5613 14001fb22-14001fb26 5609->5613 5614 14001fad6-14001fae0 5609->5614 5610->5613 5615 14001faef-14001faf3 5610->5615 5617 14001fc49 5611->5617 5612->5611 5618 14001fb32-14001fb3a 5613->5618 5619 14001fb28-14001fb2d 5613->5619 5620 14001fc15-14001fc1d 5614->5620 5621 14001faf5-14001fafa 5615->5621 5622 14001fafc-14001fb04 5615->5622 5617->5601 5623 14001fbdc-14001fbe7 5618->5623 5624 14001fb40-14001fb47 5618->5624 5619->5623 5620->5604 5625 14001fb08-14001fb13 call 1400aa420 5621->5625 5622->5625 5629 14001fbe9-14001fbec 5623->5629 5630 14001fbfc 5623->5630 5626 14001fb98-14001fb9f 5624->5626 5627 14001fb49-14001fb55 5624->5627 5625->5617 5645 14001fb19-14001fb1d 5625->5645 5635 14001fba1-14001fba8 5626->5635 5636 14001fbaa-14001fbb1 5626->5636 5632 14001fb57 5627->5632 5633 14001fb5f-14001fb75 5627->5633 5629->5630 5631 14001fbee-14001fbfa call 1400cb13c 5629->5631 5634 14001fbff-14001fc02 5630->5634 5631->5634 5632->5633 5641 14001fb77-14001fb7f 5633->5641 5642 14001fb8e-14001fb96 5633->5642 5639 14001fc04-14001fc0f call 1400ca9c4 5634->5639 5640 14001fc70-14001fc73 5634->5640 5635->5623 5643 14001fbb3-14001fbd3 5636->5643 5644 14001fbd5 5636->5644 5639->5640 5654 14001fc11 5639->5654 5647 14001fc86-14001fc8a 5640->5647 5648 14001fc75-14001fc84 5640->5648 5641->5642 5650 14001fb81-14001fb8b 5641->5650 5642->5623 5643->5623 5644->5623 5645->5620 5651 14001fc8e-14001fcac call 140040760 5647->5651 5648->5651 5650->5642 5651->5617 5654->5620
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno$AllocHeapTimer_callnewhfreemalloc
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 3883470740-457448710
                          • Opcode ID: 89a05598f303e74c8b7b159fff86001836135ea598efc98566f4fecc41a61440
                          • Instruction ID: 8f66554224957d9de1fb3b7a0c1da5cc8a2b031ce745352ae12844b27a401f91
                          • Opcode Fuzzy Hash: 89a05598f303e74c8b7b159fff86001836135ea598efc98566f4fecc41a61440
                          • Instruction Fuzzy Hash: 6CE1AD72204B8486EB169F22E8903E837A1F74CFD8F544125EF9A1B7B9CB39C491E740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5656 140036efd-140036f04 5657 140036faa-140036fcb call 1400ad060 5656->5657 5658 140036f0a-140036f29 call 140025200 5656->5658 5664 140037042-140037055 5657->5664 5665 140036fcd-140036fdd call 14000c660 5657->5665 5658->5657 5663 140036f2b-140036f36 5658->5663 5666 140036f44-140036f4e 5663->5666 5667 140036f38-140036f3f 5663->5667 5668 140037063 5664->5668 5669 140037057-14003705c 5664->5669 5681 140036fdf-140036ff4 call 1400ca93c 5665->5681 5682 14003701d 5665->5682 5672 140036f74-140036f7e 5666->5672 5673 140036f50-140036f5c 5666->5673 5671 140038a63 5667->5671 5675 140037065-140037069 5668->5675 5669->5668 5674 14003705e-140037061 5669->5674 5677 140038a68-140038a7c call 140040410 5671->5677 5672->5657 5679 140036f80-140036f8a 5672->5679 5673->5672 5678 140036f5e-140036f6f 5673->5678 5674->5675 5680 14003706d-140037077 call 140024d90 5675->5680 5699 140038a82-140038a87 5677->5699 5700 140038e5e-140038e8b 5677->5700 5678->5677 5685 140036f94-140036fa5 5679->5685 5686 140036f8c-140036f92 5679->5686 5689 14003707c 5680->5689 5694 140036ff6-140037005 call 140025070 5681->5694 5695 14003700a-140037018 5681->5695 5682->5664 5687 14003701f-140037022 5682->5687 5685->5677 5686->5657 5686->5685 5687->5664 5692 140037024-140037040 5687->5692 5689->5671 5693 140038a94-140038a96 5689->5693 5692->5680 5698 140038a9a-140038aa1 5693->5698 5694->5693 5695->5671 5698->5700 5702 140038aa7-140038ab5 5698->5702 5699->5698 5703 140038ac1 5702->5703 5704 140038ac5-140038ac8 5703->5704 5705 140038e5c 5704->5705 5706 140038ace-140038ad0 5704->5706 5705->5700 5708 140032611-14003262e GetTickCount 5706->5708 5709 1400325e0-1400325e8 5706->5709 5710 140032667-14003266e 5708->5710 5711 140032630-14003264d PeekMessageW 5708->5711 5712 1400325ea-1400325f7 GlobalUnlock 5709->5712 5713 1400325fe-14003260a CloseClipboard 5709->5713 5716 1400326a4-1400326b2 5710->5716 5717 140032670-140032677 5710->5717 5714 140032659-140032661 GetTickCount 5711->5714 5715 14003264f-140032654 call 140001a70 5711->5715 5712->5713 5713->5708 5714->5710 5715->5714 5720 1400326b4-1400326b7 5716->5720 5721 1400326b9-1400326bf 5716->5721 5717->5716 5719 140032679-140032682 5717->5719 5719->5716 5722 140032684-140032689 5719->5722 5720->5721 5723 1400326cb-1400326d7 call 140001a70 5720->5723 5724 1400326c1-1400326c9 5721->5724 5725 1400326de-1400326e5 5721->5725 5728 14003268b-14003269c 5722->5728 5729 14003269e-1400326a1 5722->5729 5723->5725 5724->5723 5724->5725 5726 1400326e7 5725->5726 5727 14003270c-14003271f 5725->5727 5731 1400326f0-140032703 call 140001a70 5726->5731 5732 140032721-140032768 GetTickCount 5727->5732 5733 14003276d-140032773 5727->5733 5728->5716 5729->5716 5743 140032705 5731->5743 5732->5733 5736 1400327b1 5733->5736 5737 140032775-140032777 5733->5737 5739 1400327b8-1400327c4 5736->5739 5737->5736 5740 140032779-140032782 5737->5740 5741 1400327ca-1400327ce 5739->5741 5742 14003297e-140032991 5739->5742 5740->5739 5744 140032784-140032791 call 14008a1c0 5740->5744 5741->5742 5745 1400327d4-1400327e9 call 140039350 5741->5745 5747 140033c97-140033cc4 5742->5747 5748 140032997-1400329aa 5742->5748 5743->5727 5752 140032796-14003279d 5744->5752 5757 1400328b6-1400328c8 5745->5757 5758 1400327ef-1400327fb 5745->5758 5749 140038e51-140038e53 5747->5749 5750 140033cca-140033cd4 5747->5750 5755 140033c26-140033c2a 5748->5755 5749->5700 5756 140038ab7 5750->5756 5752->5700 5754 1400327a3-1400327af 5752->5754 5754->5739 5755->5756 5759 140038abc 5756->5759 5762 14003296c-140032973 5757->5762 5763 1400328ce-1400328d5 5757->5763 5760 14003282f-14003284d call 140032530 5758->5760 5761 1400327fd 5758->5761 5759->5703 5775 140032852-140032855 5760->5775 5764 140032800-140032810 call 140032530 5761->5764 5762->5705 5766 140032979 5762->5766 5767 1400328d7 5763->5767 5768 14003290f-14003292d call 140032530 5763->5768 5774 140032815-14003282b 5764->5774 5766->5703 5772 1400328e0-1400328f0 call 140032530 5767->5772 5778 140032932-140032939 5768->5778 5777 1400328f5-14003290b 5772->5777 5774->5764 5779 14003282d 5774->5779 5775->5703 5780 14003285b-140032862 5775->5780 5777->5772 5781 14003290d 5777->5781 5782 140038ad5-140038adc 5778->5782 5783 14003293f-140032942 5778->5783 5779->5775 5784 140038ae1-140038aea 5780->5784 5785 140032868-14003286b 5780->5785 5781->5778 5782->5705 5783->5782 5786 140032948-14003294b 5783->5786 5784->5700 5785->5784 5787 140032871-140032874 5785->5787 5786->5755 5788 140032951-140032959 5786->5788 5789 140032891-1400328a2 5787->5789 5790 140032876-14003287e 5787->5790 5791 140038aef-140038afb 5788->5791 5792 14003295f-140032967 5788->5792 5789->5704 5793 1400328a8-1400328b1 5789->5793 5790->5782 5794 140032884-14003288c 5790->5794 5791->5700 5792->5759 5793->5704 5794->5703
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Delete$Parameter #1 invalid.$Parameter #1 must not be blank in this case.$Parameter #2 invalid.$Target label does not exist.
                          • API String ID: 1623861271-14243736
                          • Opcode ID: d4375b719f80fd7be00ae5655691ed0cc6074984445943dfd3cd609010b70d44
                          • Instruction ID: df84d9977cac44981013a0d19893c19c3ff6f1e52c3764bb3910a682ac4d2640
                          • Opcode Fuzzy Hash: d4375b719f80fd7be00ae5655691ed0cc6074984445943dfd3cd609010b70d44
                          • Instruction Fuzzy Hash: FDD1AA32205B8485FB6BCB27E8947EA27A1F78DBD4F444116EB59876F9DB38C884C740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5796 14009c6d5-14009c6e3 call 14008bf70 5799 14009cdda-14009cded DefDlgProcW 5796->5799 5800 14009c6e9-14009c6f3 call 1400a31a0 5796->5800 5803 14009cdf3-14009ce1b 5799->5803 5805 14009c6cb-14009c6d0 5800->5805 5806 14009c6f5-14009c6fe 5800->5806 5805->5799 5805->5803 5806->5799 5808 14009c704-14009c714 5806->5808 5808->5799 5809 14009c71a-14009c720 5808->5809 5809->5799 5810 14009c726-14009c730 5809->5810 5811 14009c75a-14009c774 GetClassLongPtrW FillRect 5810->5811 5812 14009c732-14009c738 5810->5812 5814 14009c77a-14009c7a0 5811->5814 5812->5811 5813 14009c73a-14009c758 FillRect SetBkColor 5812->5813 5813->5814 5815 14009c7ae-14009c7c8 SendMessageW 5814->5815 5816 14009c7a2-14009c7ac SetTextColor 5814->5816 5817 14009c7ca-14009c7e2 SendMessageW 5815->5817 5818 14009c815-14009c818 5815->5818 5816->5815 5819 14009c7e4 5817->5819 5820 14009c7e8-14009c80f DrawTextW 5817->5820 5818->5799 5821 14009c81e-14009c82a SetTextColor 5818->5821 5819->5820 5820->5818 5821->5799
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ColorText$DrawFillMessageRectSend$ClassIconLongProc
                          • String ID: %
                          • API String ID: 3581072365-2567322570
                          • Opcode ID: bd8ca13a981b770760587a4f2df2c56b3f935a1dcb6fbd9408150ff03a99c3c7
                          • Instruction ID: 5e344e09d8420c00a1be03113151e366faca63c6b41a6467a9aaa613afd1098c
                          • Opcode Fuzzy Hash: bd8ca13a981b770760587a4f2df2c56b3f935a1dcb6fbd9408150ff03a99c3c7
                          • Instruction Fuzzy Hash: 2A418BB6A11A4086E7228F66D4547D963B0F78CBE8F154212EF5E57BE8CF34C985C780

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _amsg_exit$CommandInfoInitializeLineStartup__wsetargv_cinit_wwincmdln
                          • String ID:
                          • API String ID: 697445056-0
                          • Opcode ID: b4475c2a61ccf680a2b57b882e77c30ad0794943197dd7ee3e36d7eef23a5246
                          • Instruction ID: 609180317a09595b3129bb57f799dfd153210b2efc9d7a91502459921f4d60e3
                          • Opcode Fuzzy Hash: b4475c2a61ccf680a2b57b882e77c30ad0794943197dd7ee3e36d7eef23a5246
                          • Instruction Fuzzy Hash: 86415E3161834286FB6AB7A3A4513ED3291AB8D7C8F00403AB745472F3EF7CC846A652
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$ClipboardCloseCountGlobalMessagePeekTickUnlock
                          • String ID: Jumps cannot exit a FINALLY block.
                          • API String ID: 2404689025-672026804
                          • Opcode ID: 894f871a0d370a7f644a4cfeedae371794e0d6f94d18c8e5e83a30e7d700fd91
                          • Instruction ID: b980b677b5497f68a03749326b3b27e16a80777a9e94af4c2c4feec4f11ec951
                          • Opcode Fuzzy Hash: 894f871a0d370a7f644a4cfeedae371794e0d6f94d18c8e5e83a30e7d700fd91
                          • Instruction Fuzzy Hash: 7A027876604B408AFB6B8B26E4807EA77A1F74DBE4F140126EB5947BB5DB38D881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$ClassCurrentDialogDirectoryDragFinishForegroundMessageNameProcessThread
                          • String ID: #32770
                          • API String ID: 3456408793-463685578
                          • Opcode ID: 60cd076971c80a99909ccec28924f312fb6838927afc6aa3ff89a3eec4d90db2
                          • Instruction ID: fd0e39c55082546efb900ab456086316c6b45ba5157be4ab6b2f3111c2a1b44d
                          • Opcode Fuzzy Hash: 60cd076971c80a99909ccec28924f312fb6838927afc6aa3ff89a3eec4d90db2
                          • Instruction Fuzzy Hash: 60B117B2205B818AEB67CF27B8543EA37A4B78DBD4F184115EB4A17BB9DB34D841C740

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 7062 14006b5c0-14006b61e SetLastError 7063 14006b621-14006b623 7062->7063 7064 14006b625-14006b62c 7063->7064 7065 14006b6a2-14006b6af call 1400ca590 7063->7065 7067 14006b631-14006b643 7064->7067 7068 14006b62e 7064->7068 7069 14006b6b4-14006b6e1 GetLastError 7065->7069 7067->7063 7070 14006b645-14006b647 7067->7070 7068->7067 7073 14006b717-14006b724 7069->7073 7074 14006b6e3-14006b712 call 1400ca6bc call 14003fe10 7069->7074 7070->7065 7072 14006b649-14006b65a 7070->7072 7075 14006b666-14006b67f call 1400d23d0 7072->7075 7076 14006b65c 7072->7076 7078 14006b747-14006b752 7073->7078 7079 14006b726-14006b742 call 1400b1500 7073->7079 7090 14006ba1b-14006ba40 7074->7090 7075->7065 7087 14006b681 7075->7087 7076->7075 7083 14006b754-14006b75b 7078->7083 7084 14006b75d 7078->7084 7079->7090 7088 14006b763-14006b76d 7083->7088 7084->7088 7091 14006b686-14006b68d 7087->7091 7092 14006b77f-14006b789 7088->7092 7093 14006b76f-14006b77a call 140006090 7088->7093 7095 14006b692-14006b6a0 7091->7095 7096 14006b68f 7091->7096 7098 14006b7b0-14006b7b8 7092->7098 7099 14006b78b-14006b78f 7092->7099 7093->7090 7095->7065 7095->7091 7096->7095 7102 14006b827-14006b829 7098->7102 7103 14006b7ba-14006b7bc 7098->7103 7099->7098 7101 14006b791-14006b7ab call 140040760 7099->7101 7101->7090 7106 14006b840-14006b84b 7102->7106 7107 14006b82b-14006b839 7102->7107 7104 14006b7be-14006b7c6 7103->7104 7105 14006b7cc-14006b7da 7103->7105 7104->7105 7109 14006b7dc-14006b7de 7105->7109 7110 14006b81a-14006b822 7105->7110 7112 14006b9f5-14006b9fc 7106->7112 7113 14006b851-14006b85e 7106->7113 7107->7106 7109->7090 7116 14006b7e4-14006b7eb 7109->7116 7110->7090 7117 14006b9fe-14006ba05 call 1400cb300 7112->7117 7118 14006ba0a-14006ba17 7112->7118 7114 14006b877-14006b87f 7113->7114 7115 14006b860-14006b862 7113->7115 7120 14006b8b4-14006b8b8 7114->7120 7122 14006b881-14006b885 7114->7122 7115->7120 7121 14006b864-14006b872 7115->7121 7116->7090 7123 14006b7f1-14006b7f7 7116->7123 7117->7118 7118->7090 7129 14006b8c4-14006b8cc 7120->7129 7130 14006b8ba-14006b8bf 7120->7130 7125 14006b9a9-14006b9b5 7121->7125 7126 14006b887-14006b88c 7122->7126 7127 14006b88e-14006b896 7122->7127 7123->7110 7128 14006b7f9-14006b815 call 1400cb13c 7123->7128 7125->7112 7131 14006b89a-14006b8a5 call 1400aa420 7126->7131 7127->7131 7128->7090 7133 14006b970-14006b97b 7129->7133 7134 14006b8d2-14006b8d9 7129->7134 7130->7133 7131->7090 7154 14006b8ab-14006b8af 7131->7154 7137 14006b990 7133->7137 7138 14006b97d-14006b980 7133->7138 7139 14006b8db-14006b8e7 7134->7139 7140 14006b92a-14006b931 7134->7140 7145 14006b993-14006b996 7137->7145 7138->7137 7144 14006b982-14006b98e call 1400cb13c 7138->7144 7146 14006b8f1-14006b907 7139->7146 7147 14006b8e9 7139->7147 7141 14006b933-14006b93b 7140->7141 7142 14006b93d-14006b944 7140->7142 7141->7133 7152 14006b968 7142->7152 7153 14006b946-14006b966 7142->7153 7144->7145 7148 14006b9b7-14006b9ba 7145->7148 7149 14006b998-14006b9a3 call 1400ca9c4 7145->7149 7150 14006b920-14006b928 7146->7150 7151 14006b909-14006b911 7146->7151 7147->7146 7158 14006b9cd-14006b9d1 7148->7158 7159 14006b9bc-14006b9cb 7148->7159 7149->7148 7163 14006b9a5 7149->7163 7150->7133 7151->7150 7157 14006b913-14006b91d 7151->7157 7152->7133 7153->7133 7154->7125 7157->7150 7162 14006b9d5-14006b9f3 call 140040760 7158->7162 7159->7162 7162->7090 7163->7125
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$_ui64tow
                          • String ID: DllCall$Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 743644357-2796034656
                          • Opcode ID: 30c22218f20fc1393225400101f01abcb2ba1b898509820f19494226a6918821
                          • Instruction ID: 2f56a1c5143b3456a1d214043558909e61a9d66f2cf3dc264708bce5cafc20fe
                          • Opcode Fuzzy Hash: 30c22218f20fc1393225400101f01abcb2ba1b898509820f19494226a6918821
                          • Instruction Fuzzy Hash: A5D102B2614B9096EB62DB23D8503D823A6F74C7D4F648A16FB5E17BB1DB38D496C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTickfree$ClipboardCloseGlobalMessagePeekUnlockmalloc
                          • String ID: Out of memory.
                          • API String ID: 2261973038-4087320997
                          • Opcode ID: e533d7a674ddb82b47b8794518451133a85479d0ae54313d83962e29dc8d5c70
                          • Instruction ID: 4f35984bdacec5c1c9fe8739b4f1d8ce1f6db9fbd92a5740a22ee401ca8d0a64
                          • Opcode Fuzzy Hash: e533d7a674ddb82b47b8794518451133a85479d0ae54313d83962e29dc8d5c70
                          • Instruction Fuzzy Hash: E7C18D72604B408AEB6BCB26E8803EA77A1F74DBD4F140116EB9947BB5DF38D881C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID: %%%s%s%s$Float$Integer
                          • API String ID: 130734711-2931010843
                          • Opcode ID: 866d0e43d7adba5530e0e86099549c5159416f7d90b6095df8cec0e0a5887095
                          • Instruction ID: b463e45ca59adde006ff25223be624469cbf681a637fbf406e2a6bc45ff005eb
                          • Opcode Fuzzy Hash: 866d0e43d7adba5530e0e86099549c5159416f7d90b6095df8cec0e0a5887095
                          • Instruction Fuzzy Hash: 59C17931205B4086FB6B8B27E8847EA67A2B74DBD4F540126FB5A877F5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseErrorGlobalLastMessagePeekUnlockfree
                          • String ID: Parameter #1 invalid.$Press OK to continue.
                          • API String ID: 2434512724-108709617
                          • Opcode ID: 328a669dcedaadf0e1c0a2aeec1cf715933f2851625f37742546451247e93e18
                          • Instruction ID: b42d5fe6669b8482cda54fbe51ab39045c34f9fd113e49e2e600a082d652637e
                          • Opcode Fuzzy Hash: 328a669dcedaadf0e1c0a2aeec1cf715933f2851625f37742546451247e93e18
                          • Instruction Fuzzy Hash: E0B17E32604B4086FB6B8B27E9907EA67A1F78DBD4F540216FB5947AF5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectReleaseSelectWindowfree
                          • String ID: Can't create control.$edit
                          • API String ID: 1776778015-856612840
                          • Opcode ID: 7a5460019013327b5aa257e86312c8aceafb2e978c17e8d164aefb6969f4be87
                          • Instruction ID: 53e184de982a22cb250a3bd49ea22ae1230940ed79c5761413d21cecd4317676
                          • Opcode Fuzzy Hash: 7a5460019013327b5aa257e86312c8aceafb2e978c17e8d164aefb6969f4be87
                          • Instruction Fuzzy Hash: 49514776705B408AEBA2CF2AE9447D973E1F74CBE4F144025EF4957BA8DB38C9858B40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$Window$CreateLongObjectReleaseSelect
                          • String ID: Can't create control.$button
                          • API String ID: 841324528-1804316079
                          • Opcode ID: a05c52d3d54e6efae770d1f2596ec72e6be64b93865aa0dffd4c1bdcd55146de
                          • Instruction ID: 6e3a4506b1df561b7e5899ce8ebd38ea4a0091c3c24feb1f06ddd8c7866cc20f
                          • Opcode Fuzzy Hash: a05c52d3d54e6efae770d1f2596ec72e6be64b93865aa0dffd4c1bdcd55146de
                          • Instruction Fuzzy Hash: B5411876705A8086EB62CF2AE48479973B0F78CB98F144122EF4957B78DF39C985CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno_invalid_parameter_noinfo$wcsncpy
                          • String ID: /ErrorStdOut$/force$/restart$=$A_Args$Out of memory.
                          • API String ID: 3818259516-673611611
                          • Opcode ID: 719e86fec5fb30e6635f0de3b3adc4bf88001b86bbca8606fb4467cdb87899fd
                          • Instruction ID: df151bc6e530dde0a0f471a7549e07a4e02559e32d04c0a7d5ab0e679c69e57f
                          • Opcode Fuzzy Hash: 719e86fec5fb30e6635f0de3b3adc4bf88001b86bbca8606fb4467cdb87899fd
                          • Instruction Fuzzy Hash: 6ED1DF72205B8181EA26DB26F8403EF63A1F78D7D8F840215BB4D4B6E9EF79C549C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: %s\%s$ahk_default
                          • API String ID: 1623861271-75935552
                          • Opcode ID: 8abce46bf4fda210c436122dc2021bddfd6a1d0968b3632fbd66e17ece41af1d
                          • Instruction ID: bcb47a53efd6ea27119d86298b6c392b62cfd1f711dfb416c03bce3bd442237e
                          • Opcode Fuzzy Hash: 8abce46bf4fda210c436122dc2021bddfd6a1d0968b3632fbd66e17ece41af1d
                          • Instruction Fuzzy Hash: 10C17C72604B4486FB6BCB27E8847EA27A1F74DBD4F580116EB5947AF5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                          • String ID: Environment
                          • API String ID: 3716859204-3233436149
                          • Opcode ID: 144a496faaa69796814d2430d54e197cecb19cb906a5a772f6fda771bf806e08
                          • Instruction ID: a352cdda06138efb39d9baf7b6950f852ba629cafca0125f62967e2953884633
                          • Opcode Fuzzy Hash: 144a496faaa69796814d2430d54e197cecb19cb906a5a772f6fda771bf806e08
                          • Instruction Fuzzy Hash: EF916E32205B4486FB6B8B26E8847EA37A1F74DBD4F540116EB5947AF5DB38D880CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClassCursorLoadRegister
                          • String ID: AutoHotkeyGUI$P$RegClass
                          • API String ID: 1693014935-1255895312
                          • Opcode ID: 9e006f61e000fab0118eb827aad13b74fce2ef95fd8abed4b524e22c8d6031dd
                          • Instruction ID: 8dd6fc64b1e2f0bbfe2c3d719fdd363ec999c7de3380550ffc3a48790d6b2f84
                          • Opcode Fuzzy Hash: 9e006f61e000fab0118eb827aad13b74fce2ef95fd8abed4b524e22c8d6031dd
                          • Instruction Fuzzy Hash: 2F514A36619B8486EB669F26F84039A73A0F78CB94F144129EB8D47B78DF38C485CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                          • API String ID: 3061335427-457448710
                          • Opcode ID: 464d044d6c010e120ac9b3dd8dd16ec08936bcc3c13f87b7e77139864ed00aab
                          • Instruction ID: bea7a777fb31d1cbd55591d04112391db0f51e2147ef09d2eb0260febcbbf838
                          • Opcode Fuzzy Hash: 464d044d6c010e120ac9b3dd8dd16ec08936bcc3c13f87b7e77139864ed00aab
                          • Instruction Fuzzy Hash: AEE19F72605B8481FB628B16A4047EA77A5FB4EBD8F440116EB9907BB8DB7CC695C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID: CSV
                          • API String ID: 130734711-2651001053
                          • Opcode ID: 9c9d7a73c801adcb59af1557035866a5eb7bd6a093c2f17a7bc7370fb51e5fcc
                          • Instruction ID: e3a4817ddb17f0a0565de77c4a27dfc75c71579afeb289edebabff1b708afb2a
                          • Opcode Fuzzy Hash: 9c9d7a73c801adcb59af1557035866a5eb7bd6a093c2f17a7bc7370fb51e5fcc
                          • Instruction Fuzzy Hash: 1AB16E76604B4486EB678B27E8807DA77A1F74DBD4F140116EB9D87BB8DB38D881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Target label does not exist.
                          • API String ID: 1623861271-2507343300
                          • Opcode ID: 147031a2105dba334dfc5ee5ad9243a80a735e95b27d62faec13df5b74d1c7f5
                          • Instruction ID: aace4068658c82635329fa8fc78d7488498a5df07afcc4a8738732627e58b01e
                          • Opcode Fuzzy Hash: 147031a2105dba334dfc5ee5ad9243a80a735e95b27d62faec13df5b74d1c7f5
                          • Instruction Fuzzy Hash: CFB16B32205B4485FB6B8B2BE8847EA27A1FB4DBE4F540116EB9D476F5DB38D881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Parameter #4 invalid.
                          • API String ID: 1623861271-2921795276
                          • Opcode ID: 857f209943daf973292fff455a9d248801c78b0edb2cd361c15867a507f81494
                          • Instruction ID: 0f27de11408b81ce3014497cfd26679d1e36502dfa3f7262f1d4801a440f512d
                          • Opcode Fuzzy Hash: 857f209943daf973292fff455a9d248801c78b0edb2cd361c15867a507f81494
                          • Instruction Fuzzy Hash: C5A14C32205B4486EB6B8B27E8847DA77A1F78DBD4F540116EB994BBF5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Parameter #1 invalid.
                          • API String ID: 1623861271-1208927624
                          • Opcode ID: 544957f71ff17bdf8c5a9e1c44536fa97715ae66f479537390bbd8cfe94ee193
                          • Instruction ID: 30d1e0492f438f831301775a19d33d8d72e9933165584f8ebe28364e7603ccc4
                          • Opcode Fuzzy Hash: 544957f71ff17bdf8c5a9e1c44536fa97715ae66f479537390bbd8cfe94ee193
                          • Instruction Fuzzy Hash: 3BA16C32604B4486FB6B8B27E8847EA27A1F74DBD4F140116FB5947AF5DB38D881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Target label does not exist.
                          • API String ID: 1623861271-2507343300
                          • Opcode ID: b32c6aa9316b8743a09f7d39e405895c95debda80ad866e8b9a5a6dddbfe096c
                          • Instruction ID: 26656d7651a0917ffc5eb612e7d0bcb048d07d5d8c6c9b31dbf9d8b554363f49
                          • Opcode Fuzzy Hash: b32c6aa9316b8743a09f7d39e405895c95debda80ad866e8b9a5a6dddbfe096c
                          • Instruction Fuzzy Hash: 19917D72205B4486FB6B8B27E8847EA37A1F74DBD4F540116EB59876F5DB38D880C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID: wait
                          • API String ID: 130734711-2112783333
                          • Opcode ID: e0d6e31562b896ca373e71e083e82370e43dbe30f44e5f047f70478b098e59e6
                          • Instruction ID: 5da65bfb88205fc8555bf1698dfdee66b737901d836d1a80fdbbf51f27e8b054
                          • Opcode Fuzzy Hash: e0d6e31562b896ca373e71e083e82370e43dbe30f44e5f047f70478b098e59e6
                          • Instruction Fuzzy Hash: 90916D32205B4486FB6B8B27E9947EA27A1F74DBD4F140116EB59876F5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Parameter #1 invalid.
                          • API String ID: 1623861271-1208927624
                          • Opcode ID: df6b4d9910ff75dd7a4214545514ec7d4b191f7a47d537d11f9dda1c890b39e1
                          • Instruction ID: 30d188d6ab8ac60033a158e048a00c4180f0f62e663e2c38c7cb11da4888db4d
                          • Opcode Fuzzy Hash: df6b4d9910ff75dd7a4214545514ec7d4b191f7a47d537d11f9dda1c890b39e1
                          • Instruction Fuzzy Hash: 95917F72205B4486FB6B8B27E9847EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Parameter #1 invalid.
                          • API String ID: 1623861271-1208927624
                          • Opcode ID: 95350fa34d164adf73082086bbcfbef907454157fdb3546493461143d1087627
                          • Instruction ID: e1209d58e34460a699a7d5d6fd0990d6c0cd04d741774a85a1ed39e15dc4ddf2
                          • Opcode Fuzzy Hash: 95350fa34d164adf73082086bbcfbef907454157fdb3546493461143d1087627
                          • Instruction Fuzzy Hash: 65917D32604B4486FB6B8B27E9847EA37A1F74DBE4F140216EB59876F5DB38D881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID: Parameter #1 invalid.
                          • API String ID: 1623861271-1208927624
                          • Opcode ID: 39d3901d6f44e35c5a229d350de7773d4e79803879d4b93d855608c75856e149
                          • Instruction ID: 9ed13f515d4ce4dee297667e0a15b868fd5d6853cd6140bf289ae4698d677cd3
                          • Opcode Fuzzy Hash: 39d3901d6f44e35c5a229d350de7773d4e79803879d4b93d855608c75856e149
                          • Instruction Fuzzy Hash: 67917E72604B4486FB6B8B27E8847EA37A1F74DBE4F540216EB59876F5CB38D880C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID: Play
                          • API String ID: 130734711-4273697156
                          • Opcode ID: 90903727ad5402f4f0b7a1f36a2acca89c3215d82ba5eac7b4d0a437b60cdb3e
                          • Instruction ID: 1747f8b5322398b0e1493671b2351a7ebaeb0362ff10759a50ced827d42cfff3
                          • Opcode Fuzzy Hash: 90903727ad5402f4f0b7a1f36a2acca89c3215d82ba5eac7b4d0a437b60cdb3e
                          • Instruction Fuzzy Hash: 87918D32604B4086FB6B8B27E8847EA37A1F74DBE4F540116EB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CharCountTick$ClipboardCloseGlobalLowerMessagePeekUnlockUpper
                          • String ID:
                          • API String ID: 1737845391-0
                          • Opcode ID: c34081595b743701083d210b16ab36117261ac4a9f7991d4bbb36246ddb014d9
                          • Instruction ID: 61a683632832d59f33edfa51e896452e1f622b885c2cf17f394f6f37029038c5
                          • Opcode Fuzzy Hash: c34081595b743701083d210b16ab36117261ac4a9f7991d4bbb36246ddb014d9
                          • Instruction Fuzzy Hash: 49C19D72604B8486FB6B9B27A4443EA37A1F74DBE4F184116FB9A476F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Rect$InvalidateLongMessagePointsSendTextVisiblefree
                          • String ID:
                          • API String ID: 630983731-0
                          • Opcode ID: 86ce8c0b6de079c9ebd7cd3cc028fa0111c6e269b16d4ec783f0dfd014f15539
                          • Instruction ID: bee1efe90cc0383f5393f927a929ea03e573d3efb14ffdf7db86919b96f3ef21
                          • Opcode Fuzzy Hash: 86ce8c0b6de079c9ebd7cd3cc028fa0111c6e269b16d4ec783f0dfd014f15539
                          • Instruction Fuzzy Hash: D6312A36204A4082EA668B17E4547EA7361F78DBD4F544113EF9D47AB4DF39CA84C741
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: FocusWindow$EnableForegroundLongMessageSendfree
                          • String ID:
                          • API String ID: 2811015919-0
                          • Opcode ID: d7d510f8644fa73f32a379e7d2675eb28b043e478ef7020f7db0db4832839837
                          • Instruction ID: a7513f680ce126bceec2031d9d77546d91186d5bdba9eb852ff1f7954051bb83
                          • Opcode Fuzzy Hash: d7d510f8644fa73f32a379e7d2675eb28b043e478ef7020f7db0db4832839837
                          • Instruction Fuzzy Hash: FA319277205A8082FB678B27E4557D977A1B74DBE0F584212FB6A47AF0DF38CA848241
                          APIs
                          • free.LIBCMT ref: 000000014003C1C5
                            • Part of subcall function 00000001400CB13C: RtlFreeHeap.NTDLL(?,?,00000000,00000001400CE860,?,?,00000000,00000001400CE883,?,?,?,00000001400CA7AB,?,?,00000000,00000001400CFD3B), ref: 00000001400CB152
                            • Part of subcall function 00000001400CB13C: _errno.LIBCMT ref: 00000001400CB15C
                            • Part of subcall function 00000001400CB13C: GetLastError.KERNEL32(?,?,00000000,00000001400CE860,?,?,00000000,00000001400CE883,?,?,?,00000001400CA7AB,?,?,00000000,00000001400CFD3B), ref: 00000001400CB164
                            • Part of subcall function 0000000140032530: GlobalUnlock.KERNEL32 ref: 00000001400325F1
                            • Part of subcall function 0000000140032530: CloseClipboard.USER32 ref: 00000001400325FE
                            • Part of subcall function 0000000140032530: GetTickCount.KERNEL32 ref: 0000000140032611
                            • Part of subcall function 0000000140032530: PeekMessageW.USER32 ref: 0000000140032645
                            • Part of subcall function 0000000140032530: GetTickCount.KERNEL32 ref: 0000000140032659
                          • free.LIBCMT ref: 000000014003C283
                          • free.LIBCMT ref: 000000014003C511
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CountTick$ClipboardCloseErrorFreeGlobalHeapLastMessagePeekUnlock_errno
                          • String ID: Next$_NewEnum
                          • API String ID: 837015515-2558596721
                          • Opcode ID: af281dcd72b8b90b64e33e94669b81f897075b30cf6bfe8cfb206f20821892b1
                          • Instruction ID: f673d8de0596612d9df3e71b8a84b1e73f218a0612a7808c57e5157c685c8a0b
                          • Opcode Fuzzy Hash: af281dcd72b8b90b64e33e94669b81f897075b30cf6bfe8cfb206f20821892b1
                          • Instruction Fuzzy Hash: 00F17C32225B4086EB678B66E490BEA73A0F78CBC4F104116FB8A87BB4DB38C555C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClipboardCloseCountGlobalInfoTickUnlock
                          • String ID:
                          • API String ID: 3668674636-0
                          • Opcode ID: de44b53983aeb1f76978b91df14e981601866c02eef945a29791036b998ca67d
                          • Instruction ID: e036c066776a3bb8ad3e7c7ecc3197cb02cda619ffb32ceca40dca7c2bf38de4
                          • Opcode Fuzzy Hash: de44b53983aeb1f76978b91df14e981601866c02eef945a29791036b998ca67d
                          • Instruction Fuzzy Hash: 52D15C72605B8489EB778F26E8807DA37A1F74DB98F140216EB594BBF8DB38C585C740
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: ErrorLevel$Illegal parameter name.$Out of memory.$The following %s name contains an illegal character:"%-1.300s"$_$#@$variable
                          • API String ID: 0-1002950332
                          • Opcode ID: e432ff9f77f4d85fcceea62eff5ad22a502e920c2ce5c34ab6ef5d64cda68e32
                          • Instruction ID: e20ac4bb486f400e216ba22a444663530b03c3c63c8afc318dcf4ca588859b31
                          • Opcode Fuzzy Hash: e432ff9f77f4d85fcceea62eff5ad22a502e920c2ce5c34ab6ef5d64cda68e32
                          • Instruction Fuzzy Hash: E3C18D32205BC586EBA69B16E0403D963A1F78DBD4F54012AEB8D07BB9EF39C995C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 4107439908-0
                          • Opcode ID: 4713afc110b8a87dca13b53b8b78f9ba648d06c82ec70d2f3be56d6326631fd9
                          • Instruction ID: 036ddfd78b5369459cc7606da6939e5f1cbf79a038acaaaa356241006e3216a0
                          • Opcode Fuzzy Hash: 4713afc110b8a87dca13b53b8b78f9ba648d06c82ec70d2f3be56d6326631fd9
                          • Instruction Fuzzy Hash: 90C17C32605B848AEB678B27E8803DA77A1F74DBD4F140116EB9D47BB9DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Close$CountTick$ClipboardCreateErrorGlobalLastMessagePeekUnlock
                          • String ID:
                          • API String ID: 2674141723-0
                          • Opcode ID: 3d73f2d4b418bd1914c8571bc06e1e02c3433a27d415eaca919e4f3a9a5ac397
                          • Instruction ID: 7156553a9fa36064cb3845194c3fef2ce06474acccf894b55ee4417684c9e5d5
                          • Opcode Fuzzy Hash: 3d73f2d4b418bd1914c8571bc06e1e02c3433a27d415eaca919e4f3a9a5ac397
                          • Instruction Fuzzy Hash: 4BB15A72604B4086FB6BCB26E9843EA77A1F74DBD4F540116EB9947AB9CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 4107439908-0
                          • Opcode ID: 17f474bbb9b84d0e89162685aea4e6a60c2bf40e8500fc635f1f674cc4f6e848
                          • Instruction ID: 2e94abe9c0f922389d997b1ddc19838a37285f01aa11c27f12345775d1badf60
                          • Opcode Fuzzy Hash: 17f474bbb9b84d0e89162685aea4e6a60c2bf40e8500fc635f1f674cc4f6e848
                          • Instruction Fuzzy Hash: 65A16A72204B4486FB6B8B27E9847EA67A2F74DBD4F140116FB5A47AF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseFileGlobalMessageMovePeekUnlock
                          • String ID:
                          • API String ID: 1818255640-0
                          • Opcode ID: c563493f3fc1e54c74b3ffe63e5e7f4cf29420505e6baf3dcaff241ee4598f7c
                          • Instruction ID: 877d90ab8ef1fc6a1fc739f08f73ef96f5ffee8f31010f64ebc12fba7df2134a
                          • Opcode Fuzzy Hash: c563493f3fc1e54c74b3ffe63e5e7f4cf29420505e6baf3dcaff241ee4598f7c
                          • Instruction Fuzzy Hash: ACA16D32205B4086FB6B8B27E9847EA27A1F74DBE4F540116FB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$BeepClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 3141429382-0
                          • Opcode ID: b302dd10fc5a187e1ae216ed9bbaf8034b05eb93bd433bb5db04f7e77ac2e956
                          • Instruction ID: c79232b8b725a857e0ab12b3ed4e26211bc8c6a0557c387c04f6977eef52738c
                          • Opcode Fuzzy Hash: b302dd10fc5a187e1ae216ed9bbaf8034b05eb93bd433bb5db04f7e77ac2e956
                          • Instruction Fuzzy Hash: F5917F32604B4486FB6B8B27E8847EA77A1F74DBD4F540116EB5A876F5DB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Initialize$CriticalSectionmalloc
                          • String ID: A_Clipboard$Clipboard$No tray mem$Tray
                          • API String ID: 2052168798-66866361
                          • Opcode ID: ed2499b9edc8328269fbca50d421fff63701b1881e1851b1e7a3dc92aee2b278
                          • Instruction ID: 34c4ee07c10a01aecee0d8bc948f6e5a51b5fd2068c90f0e7f9a28d9235baf38
                          • Opcode Fuzzy Hash: ed2499b9edc8328269fbca50d421fff63701b1881e1851b1e7a3dc92aee2b278
                          • Instruction Fuzzy Hash: 78B1F271104B4485FB1B8B57BD80BC9B7E8BB6CB98F58021ADB890BBB1DB78C554C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTickWindow$ClipboardCloseForegroundGlobalMessagePeekTextUnlockVisible
                          • String ID:
                          • API String ID: 1043259673-0
                          • Opcode ID: 6e610f6c55fbc4f3183bcea970a900daf602bca5fbab494276d61da9ecee9e32
                          • Instruction ID: 55a140f0c2a9694814d8f710e01f6c86f3eea0bccbce6e77625fb07b891a78b8
                          • Opcode Fuzzy Hash: 6e610f6c55fbc4f3183bcea970a900daf602bca5fbab494276d61da9ecee9e32
                          • Instruction Fuzzy Hash: 07917C32604B4486FB6B8B27E9847EA27A2F74DBE4F140116EB5947BF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseEmptyGlobalMessagePeekRecycleUnlock
                          • String ID:
                          • API String ID: 2387848762-0
                          • Opcode ID: 7b7636bd28b0cc6bb5985185693d3e9affa69f649a67d9f9068a38d5938b0c46
                          • Instruction ID: 8c85263d1e8ab5f824a7c62f5ffdb6e43536544fad9349c9ea276a72c66bcb2d
                          • Opcode Fuzzy Hash: 7b7636bd28b0cc6bb5985185693d3e9affa69f649a67d9f9068a38d5938b0c46
                          • Instruction Fuzzy Hash: 65917F32605B4486FB6B8B27E8847EA37A1F74DBD4F140116EB5A87AF5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ErrorLast$AttributesClipboardCloseFileFullGlobalMessageNamePathPeekUnlock
                          • String ID:
                          • API String ID: 769837341-0
                          • Opcode ID: 9ae2a5a04dcbd0cbac88d8287eb5ffe69c49edd1140fe2b486b46348b155ab11
                          • Instruction ID: 50982b976ea0817c6d0bf4a65305ccb4a60b00dcb952072201c725109b0eee65
                          • Opcode Fuzzy Hash: 9ae2a5a04dcbd0cbac88d8287eb5ffe69c49edd1140fe2b486b46348b155ab11
                          • Instruction Fuzzy Hash: 9E916E32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseEnvironmentGlobalMessagePeekUnlockVariable
                          • String ID:
                          • API String ID: 2791281230-0
                          • Opcode ID: 33e4aa0e6eacf495017626276df7606469c671b7ebcb30314d8407206c0d0ab1
                          • Instruction ID: 890309bedc1a62689f78676692d84190fb97ff4fcbc2eee27db7e42531541b00
                          • Opcode Fuzzy Hash: 33e4aa0e6eacf495017626276df7606469c671b7ebcb30314d8407206c0d0ab1
                          • Instruction Fuzzy Hash: 2F917E32205B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
                          • String ID:
                          • API String ID: 3677732381-0
                          • Opcode ID: c24d98d962cfdf2645b1dcc22b793842c9ca131eafc39cd1d1ccc33079339361
                          • Instruction ID: f1b6d2a9951d021e0931dc753166dec77ad54d86a8291d662ddb591f44929ce9
                          • Opcode Fuzzy Hash: c24d98d962cfdf2645b1dcc22b793842c9ca131eafc39cd1d1ccc33079339361
                          • Instruction Fuzzy Hash: 83818F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A47AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
                          • String ID:
                          • API String ID: 3677732381-0
                          • Opcode ID: 778e7c198ff5443c9dc57284f2c70388a8072537ed1911154507596743f1e261
                          • Instruction ID: 0e6369135961a4582dc4effc85702d2929442c99fe591ba6511443daad4d47f3
                          • Opcode Fuzzy Hash: 778e7c198ff5443c9dc57284f2c70388a8072537ed1911154507596743f1e261
                          • Instruction Fuzzy Hash: 24818032605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5A47AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseDebugGlobalMessageOutputPeekStringUnlock
                          • String ID:
                          • API String ID: 1875564215-0
                          • Opcode ID: 8448ff590b881a762cb38f64d4fe2bc21a3dd45318d3596ca94025e313adff95
                          • Instruction ID: f310c47613edc3b6435756bcb3ba1141b0141ff76384530fd48264ca82160fda
                          • Opcode Fuzzy Hash: 8448ff590b881a762cb38f64d4fe2bc21a3dd45318d3596ca94025e313adff95
                          • Instruction Fuzzy Hash: 94817032605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5A47AF5CB38C881C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClientRectTextWindowfree
                          • String ID: *$*$Icon
                          • API String ID: 2069302144-1089620501
                          • Opcode ID: a96cfe1ff682df3796254d2f0b12a5e3a74175b2e27a37bce33bb54975df4961
                          • Instruction ID: a2bdb3aecaf9a529164ee71dc03c76f05c5d70ab16559ea24ed4d896a9f9ebc6
                          • Opcode Fuzzy Hash: a96cfe1ff682df3796254d2f0b12a5e3a74175b2e27a37bce33bb54975df4961
                          • Instruction Fuzzy Hash: 40419B7361064091EB229F27A4447EA77A0FB4DBD4F444213FF5A076F5EB38CA808341
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSendTextWindowfree
                          • String ID:
                          • API String ID: 1940615249-0
                          • Opcode ID: 114078cc48cfc43993fc9e0d4791f953708615f6648f4f2f76c3ad5847835673
                          • Instruction ID: 4bee30611761156c8798d0a7da4842659b3641d1f09ae16251bd38757665d3ad
                          • Opcode Fuzzy Hash: 114078cc48cfc43993fc9e0d4791f953708615f6648f4f2f76c3ad5847835673
                          • Instruction Fuzzy Hash: 4B41A07660464082FB668B17E454BEE7362F38DBE4F504217EFA907AF5DE38CA848741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: wcsncpy$LongWindow$MessageSendfree
                          • String ID: LongDate$Time
                          • API String ID: 3861369536-1184810688
                          • Opcode ID: 3bacc214e411256fe0f4e9e576a049294d79e6bfb352227ebb59087da54332ee
                          • Instruction ID: b974b46f52c4f13ae4eb666a5d379edbf1e9fd90c3fd6ad36df029d6ec87be13
                          • Opcode Fuzzy Hash: 3bacc214e411256fe0f4e9e576a049294d79e6bfb352227ebb59087da54332ee
                          • Instruction Fuzzy Hash: 7B319A36301A0082FA22CB17A4147DA73A1B79EBE0F945213FF6947AF4EA7CC684C641
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectReleaseSelectWindow
                          • String ID: Can't create control.$msctls_progress32
                          • API String ID: 3196501506-3641780397
                          • Opcode ID: 1c998a5398af1aca467d9e3fb43288e1fcf38cebf217c5605ef6043569b6fa9a
                          • Instruction ID: 92af151a9e4a7856b947f63b71adb8a5b218808255448c85293a9adc46796528
                          • Opcode Fuzzy Hash: 1c998a5398af1aca467d9e3fb43288e1fcf38cebf217c5605ef6043569b6fa9a
                          • Instruction Fuzzy Hash: 60310276605B8089EB528F6AE8447D963A0B78CB94F044022EF4D57B78DB38C985CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ClientCreateLongObjectRectReleaseSelect
                          • String ID: Can't create control.$button
                          • API String ID: 2656910855-1804316079
                          • Opcode ID: 50f25d0ea784d3a1144de906f5d81eb5a4215fa7e32e3f6438b99134fd7a1411
                          • Instruction ID: 9e45261d2f1b510f2a73e4d2978b169b6d92b1913de311270dde9a9ecedbd82c
                          • Opcode Fuzzy Hash: 50f25d0ea784d3a1144de906f5d81eb5a4215fa7e32e3f6438b99134fd7a1411
                          • Instruction Fuzzy Hash: 4C310776605B418AEB52CF6AE8447DA73A0F74C794F044026EF4D57B78DB38C9858B40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$ClassCurrentDialogDirectoryForegroundMessageNameProcessThread
                          • String ID: #32770
                          • API String ID: 2633243691-463685578
                          • Opcode ID: 39f3f6b2c820b2adc62ec0c46248f4b1bb58d213936c8f867b0529768ee1e0a8
                          • Instruction ID: 2df3fe5cf134a09a3c39c27088c360e089d1495c2714eb68477407849d860956
                          • Opcode Fuzzy Hash: 39f3f6b2c820b2adc62ec0c46248f4b1bb58d213936c8f867b0529768ee1e0a8
                          • Instruction Fuzzy Hash: 343145B1205B4586FB67CB16F9443E837A0A74DB98F180026EB0A276B4DF78D989C641
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: a7a08bc4773958212e0334006784f2cbffb0a3eb6d72f362180136789992f8d8
                          • Instruction ID: b5fae96f8b0334968c3e831a56485049aa06cc607b548335f36c66e487531ee0
                          • Opcode Fuzzy Hash: a7a08bc4773958212e0334006784f2cbffb0a3eb6d72f362180136789992f8d8
                          • Instruction Fuzzy Hash: BCE18D32604B8489EB67CB26E8447EA37A1F74DBE4F144216EF9947BB5DB38D981C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: ead4ebea9b9884a8f5501a4f33a4e57c9ea26373e1d866bcf7a1552c9b9adba7
                          • Instruction ID: 256026de99d9cf3ff002d92b8d3527f4485dda61e8902aabdc844707c29aa2bd
                          • Opcode Fuzzy Hash: ead4ebea9b9884a8f5501a4f33a4e57c9ea26373e1d866bcf7a1552c9b9adba7
                          • Instruction Fuzzy Hash: 14C1C031604B4086EB678B27A4907EA7792BB8DBD4F544216FB5A877F5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 1330bcb8fddbaea4b8a07f1c27c1cb411c10bc345e8932522f288c0b09962f8e
                          • Instruction ID: effde74997eff63645fc83b0a17471bfe6aafd64dccd41992a1115adaa738275
                          • Opcode Fuzzy Hash: 1330bcb8fddbaea4b8a07f1c27c1cb411c10bc345e8932522f288c0b09962f8e
                          • Instruction Fuzzy Hash: FBB19132205B4486EB6B8B2AE4843EA77E1F74DBD4F144116EB9A877F4DB38D885C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 420b25a2327acdd8f24a005eac2a7c30fc102fa470588fb19f70eb9a59819f27
                          • Instruction ID: 3062a13442cdb81b198be0dc333b27c03537e0049c1c2e0fc2dee1fafefcf519
                          • Opcode Fuzzy Hash: 420b25a2327acdd8f24a005eac2a7c30fc102fa470588fb19f70eb9a59819f27
                          • Instruction Fuzzy Hash: 98A15E32604B4086FB6B8B27E9847EA37A2F78DBD4F540116EB594B6F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: d09719863a7252afa10bd88cc935b2dfdab5a517a05f945f465c0845df2f869c
                          • Instruction ID: a4602782116666506e0fd3a0ad5bfefcd1b9966ea6b24ed31e46a5ebd05d8295
                          • Opcode Fuzzy Hash: d09719863a7252afa10bd88cc935b2dfdab5a517a05f945f465c0845df2f869c
                          • Instruction Fuzzy Hash: CFA18E32605B448AEB6B8B27E8807EA37A1F74DBD4F140116EB9947BF5DB38C885C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: a5602ae31a25931f6812d668d8617fcf4298a20613394b5081d3d774b138eca9
                          • Instruction ID: 9eb19319e0eba1d0fa43b86700c8e6c7ca4ed2f6181965c3c42aa3589d3205ce
                          • Opcode Fuzzy Hash: a5602ae31a25931f6812d668d8617fcf4298a20613394b5081d3d774b138eca9
                          • Instruction Fuzzy Hash: 9EA18F72205B4485FB6B8B2AE8847EA77A1FB4DBE4F144115EB99477F4DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 5d53b0a44970e07bc9944d94f3944d2f671669ca0db6366a62e6195073840179
                          • Instruction ID: 93c240c575e31bc1aedfd5c41dd4c06a756d8b00d4753da70155ebfec874e4fa
                          • Opcode Fuzzy Hash: 5d53b0a44970e07bc9944d94f3944d2f671669ca0db6366a62e6195073840179
                          • Instruction Fuzzy Hash: D8A17E72605B448AEB6B8B27E8807EA37A1F74DBD4F140116EB9947BF5DB38C885C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 130734711-0
                          • Opcode ID: 8108ee78ad129d16caa05c50666d226f944127d8f65bf5d84c554b2f24f852cd
                          • Instruction ID: b7b6c6495f5e1853da77f15ece4a05a12a4ddb9dbf7fed96c9a9668c7ed4089e
                          • Opcode Fuzzy Hash: 8108ee78ad129d16caa05c50666d226f944127d8f65bf5d84c554b2f24f852cd
                          • Instruction Fuzzy Hash: 95A18E32205B4086FB6B8B27E9947EA27A2F74DBD4F540116FB5A47AF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountMessageTick$ClipboardCloseGlobalPeekSendUnlock
                          • String ID:
                          • API String ID: 38145316-0
                          • Opcode ID: 4af3e8f6adea3c7b18a0b20a8fbf157288c5cee75c812e7cb7d60fa3652986a9
                          • Instruction ID: 3d63d078151ec9e9406c2aff4685355796f32759f8aa049c8f054896c2a5a177
                          • Opcode Fuzzy Hash: 4af3e8f6adea3c7b18a0b20a8fbf157288c5cee75c812e7cb7d60fa3652986a9
                          • Instruction Fuzzy Hash: 33A18F32605B4486FB6B8B27E9847EA37A2F74DBD4F540116EB5A876F5CB38D881C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$free$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 2285768414-0
                          • Opcode ID: d3cf13f4f59cad7c46a6947201b5c6dd08d198ad48ceb5ff2758ffa42d37f614
                          • Instruction ID: 52f847c03b826b23b247fa03328dac30ee99f23286bbf4326b9fc937114cde34
                          • Opcode Fuzzy Hash: d3cf13f4f59cad7c46a6947201b5c6dd08d198ad48ceb5ff2758ffa42d37f614
                          • Instruction Fuzzy Hash: 31A17E72605B448AEB6B8B27E8807EA37A1F74DBD4F140116EB5947BF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: b0824ea8b7642af015c20a26e81f43c88517424eaee131f339b8a9e48eee184e
                          • Instruction ID: adc9ad99e7b5c9d920b62b5e1cd2f392e971b6f5eb3158599f56def3a74d26cf
                          • Opcode Fuzzy Hash: b0824ea8b7642af015c20a26e81f43c88517424eaee131f339b8a9e48eee184e
                          • Instruction Fuzzy Hash: CCA17D72605B448AEB6B8B27E8807EA37A1F74DBE4F140116EB5947BF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 16f6256a84e2bc10cf3d333128c2a889fe6fe951c4cee5165797ba249b8568e6
                          • Instruction ID: 6f82ea2d0d24cb461185e92e5cc80c8d6ab19eed439852a8ee2dfa03a2e0d28f
                          • Opcode Fuzzy Hash: 16f6256a84e2bc10cf3d333128c2a889fe6fe951c4cee5165797ba249b8568e6
                          • Instruction Fuzzy Hash: E491A132205B4485FB6B8B27E8447EA77A1FB4DBE4F140216EB9947AF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 130734711-0
                          • Opcode ID: 437035fa9d8504d726d51b6cf2b19bc56816e78fd037ed52fe3b6591649d122f
                          • Instruction ID: 1b0914023163c2e64a45956e7af399aa0c4867361e990f590feb0060999324e5
                          • Opcode Fuzzy Hash: 437035fa9d8504d726d51b6cf2b19bc56816e78fd037ed52fe3b6591649d122f
                          • Instruction Fuzzy Hash: 37A18232205B4486FB6B8B27E8847DA77A1F74DBE4F140216EBA9476F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: df74375ea67a7b595b9b657568f6dd6eb0981beedef392cc67d34b93759214f6
                          • Instruction ID: e739c0fb0456513f039fd6847c7bba16efc9e7436cad7bd0c9c75881894355ab
                          • Opcode Fuzzy Hash: df74375ea67a7b595b9b657568f6dd6eb0981beedef392cc67d34b93759214f6
                          • Instruction Fuzzy Hash: 62A17E32605B4486FB6B8B27E8847EA37A1F74DBD4F580116EB5A876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 71906d81cd77ab7fa2af4cfdbf86f398bc19423ddd0030ce3c7113673673056c
                          • Instruction ID: 0be947bca1b832f5845b97ac8c221d28fe0e52a1e57b5444dc3e9967521b642b
                          • Opcode Fuzzy Hash: 71906d81cd77ab7fa2af4cfdbf86f398bc19423ddd0030ce3c7113673673056c
                          • Instruction Fuzzy Hash: A6917E32605B4486FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 33f43794fdbdc3bfac187fa7c431a6a2749c5626d12a5ce4f77696c494c9a75e
                          • Instruction ID: d88a50eeae64920bb7a9c2125b472bb5b0ca0ed9a7437e762b2e750da3cc0391
                          • Opcode Fuzzy Hash: 33f43794fdbdc3bfac187fa7c431a6a2749c5626d12a5ce4f77696c494c9a75e
                          • Instruction Fuzzy Hash: EC917E32605B4486FB6B8B27E8847EA37A1F74DBD4F580116EB5A876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: c83983fc9717926eadde4b78b73fd0175d5069259d09d61e9e447071e5aecb20
                          • Instruction ID: 16975150cb37f0c415594a513e949aeede9941befb4e18578397c8f657ba842e
                          • Opcode Fuzzy Hash: c83983fc9717926eadde4b78b73fd0175d5069259d09d61e9e447071e5aecb20
                          • Instruction Fuzzy Hash: F9A15B72205B4486EB6B8B27E8947EA37A1F74DB94F540116EB9A877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Thread$Message$CountCreatePeekPostPrioritySleepTick
                          • String ID:
                          • API String ID: 2785037528-0
                          • Opcode ID: 6f2903994f9f0dd071cb65601b94e17217e65a96a21375288ae1fb37526dfa2d
                          • Instruction ID: 0ba042fe028a092e18cc6b09935748a84d61711e1a6cb0792fc9e4c8f37b989b
                          • Opcode Fuzzy Hash: 6f2903994f9f0dd071cb65601b94e17217e65a96a21375288ae1fb37526dfa2d
                          • Instruction Fuzzy Hash: 2891AFB261479581E7AACB07E0507FA37A4FB5DB95F848122EB49077B1DB3DC8A4D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Thread$Message$CountCreatePeekPostPrioritySleepTick
                          • String ID:
                          • API String ID: 2785037528-0
                          • Opcode ID: eb8891a3af8560fa8eee4a6e94b86ffb8101f849493c6342d1562406fb7e3f63
                          • Instruction ID: 19b65fbb63ceac6258a053ee7b8882423f92cdae53e3f65395be620b60548393
                          • Opcode Fuzzy Hash: eb8891a3af8560fa8eee4a6e94b86ffb8101f849493c6342d1562406fb7e3f63
                          • Instruction Fuzzy Hash: D591BEB261479581E7AACB07E0507FA37A4FB5DB94F848122EB89077B1DB3CC8A4D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: e5d11cea413ea8add7bac0d76169562fa0dbf8f6e653ba8ea354db56ca359b44
                          • Instruction ID: 4a48a9ba602df32ef83c0c9eefb829f2b58a56cb02d5e29f41b448bc6ecbebb6
                          • Opcode Fuzzy Hash: e5d11cea413ea8add7bac0d76169562fa0dbf8f6e653ba8ea354db56ca359b44
                          • Instruction Fuzzy Hash: 38918032204B4486FB6B8B27E8947EA37A1F74DBD4F140116EB5987AF5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Thread$Message$CountCreatePeekPostPrioritySleepTick
                          • String ID:
                          • API String ID: 2785037528-0
                          • Opcode ID: 3668caed14cebb90389da379cf07514920ee0517db728a7c123ceef38ad945e7
                          • Instruction ID: ac9088f559e68c99835174571333dc1872e99b82857aeb2c91a9fa042a092975
                          • Opcode Fuzzy Hash: 3668caed14cebb90389da379cf07514920ee0517db728a7c123ceef38ad945e7
                          • Instruction Fuzzy Hash: 2A91AEB261479581E7AACB07E0507FA37A4FB5DB94F848122EB89077B1DB3DC8A4D310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 777e6aa03d8c2964b72e30658eca650a84ef3ef6929fd2170238985553d525ea
                          • Instruction ID: 93bb4d2c62d54c48bf85cb0204f3a629e40646205ac67e5901c7fec884102bf9
                          • Opcode Fuzzy Hash: 777e6aa03d8c2964b72e30658eca650a84ef3ef6929fd2170238985553d525ea
                          • Instruction Fuzzy Hash: B0916E32605B4486FB6B8B27E9847EA37A1F74DBD4F140116EB5A87AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseDirectoryGlobalMessagePeekRemoveUnlock
                          • String ID:
                          • API String ID: 1863380684-0
                          • Opcode ID: 48a3a41d2db660346c5c9fe735af262e8be8bdcf411fdaa4ece4af4f4a7fee65
                          • Instruction ID: 1e46c2e80beb3a078e68817c8d91d28c28ef1aca653df43761f964621a6cc2e1
                          • Opcode Fuzzy Hash: 48a3a41d2db660346c5c9fe735af262e8be8bdcf411fdaa4ece4af4f4a7fee65
                          • Instruction Fuzzy Hash: 7D917E32604B4486FB6B8B27E8847EA37A1F78DBD4F140116EB59876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: d70908e7941a857616f1e10ba1afed9b7e8e1e9ceafba9b02f0d85b67ab5e619
                          • Instruction ID: 0e045dce7a7ac05f1727797ea70e3533dc301ca18eb65ea9c70cbd7f7ed64eab
                          • Opcode Fuzzy Hash: d70908e7941a857616f1e10ba1afed9b7e8e1e9ceafba9b02f0d85b67ab5e619
                          • Instruction Fuzzy Hash: 02917C32205B4486FB6B8B27E9847EA27A2F74DBE4F540116FB5947AF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceKeyboardLayoutMessagePeekUnlock
                          • String ID:
                          • API String ID: 1422310799-0
                          • Opcode ID: 8e21b37accd3727740b8ce4dc3ecbe60a89abf631283db36a77b46bf11d2ed92
                          • Instruction ID: ae7990d7bf375893bf28b5b35fb393ed6dd497a2528df30cb01c0a762ce8dbbd
                          • Opcode Fuzzy Hash: 8e21b37accd3727740b8ce4dc3ecbe60a89abf631283db36a77b46bf11d2ed92
                          • Instruction Fuzzy Hash: A0915C32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 0a618f5da3ef15c7912a2b0fbe446932580a2e737154a7c654e9dac577700a51
                          • Instruction ID: aa8e55a8f8b1dabee1d4ffb9b3f6ece5cbea332c9540687ac615e2494eb338e3
                          • Opcode Fuzzy Hash: 0a618f5da3ef15c7912a2b0fbe446932580a2e737154a7c654e9dac577700a51
                          • Instruction Fuzzy Hash: 96918D72605B4086FB6B8B27E8947EA37A2F74DBD4F140216EB5A476F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 76962503415357ab977b05af2bc4d67ad60a3573bc768e95dfac48686c5abbc0
                          • Instruction ID: ae50c88d012580033547245f2cbfd6c25a323349dd513673d14f3a3bd4d850e7
                          • Opcode Fuzzy Hash: 76962503415357ab977b05af2bc4d67ad60a3573bc768e95dfac48686c5abbc0
                          • Instruction Fuzzy Hash: D9915D32205B4486EB6B8B27E8847EA37A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTickWindow$ClipboardCloseForegroundGlobalIconicMessagePeekShowUnlockVisible
                          • String ID:
                          • API String ID: 1891409732-0
                          • Opcode ID: fd93574b367deebb3149144de17a03b3b6e2f74ea0c26a8792ddbe6d455058bb
                          • Instruction ID: 108dd4720717dc297064358b89f323d10a91c8bb459f775f1ed9779adc1728a3
                          • Opcode Fuzzy Hash: fd93574b367deebb3149144de17a03b3b6e2f74ea0c26a8792ddbe6d455058bb
                          • Instruction Fuzzy Hash: 1B915B32605B4486FB6B8B26E9847EA27A1F74DBE4F140216EB59477F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Window$ClipboardCloseGlobalMessageMovePeekRectUnlock
                          • String ID:
                          • API String ID: 1284534901-0
                          • Opcode ID: a73396b95feec6203ffc7597b8bc19132ea4c5b8fff42600085eccb152ada55c
                          • Instruction ID: 46af6feff2fbc51cf5240529920172e92ce4b1088ab8946305d818646d471af5
                          • Opcode Fuzzy Hash: a73396b95feec6203ffc7597b8bc19132ea4c5b8fff42600085eccb152ada55c
                          • Instruction Fuzzy Hash: 4A915C32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99877F5DB38C880C741
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 0caa7ce25a37093cb5762022b35527c57eee649bff488f03d63c776f62442a88
                          • Instruction ID: a05c2a7ace3d67fb0c17354eba0f27d9254260c5c3151c61b02aff84827c2443
                          • Opcode Fuzzy Hash: 0caa7ce25a37093cb5762022b35527c57eee649bff488f03d63c776f62442a88
                          • Instruction Fuzzy Hash: 63914C32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: c2d757179d48646047b21ae95da99e4bfe1f73884c21d9ebe0f8610d22d03bf7
                          • Instruction ID: db839dd5cccfde1ce053e861ed6f50112c6a6eda42cf636398ad12a4d95e91d3
                          • Opcode Fuzzy Hash: c2d757179d48646047b21ae95da99e4bfe1f73884c21d9ebe0f8610d22d03bf7
                          • Instruction Fuzzy Hash: 7E914C32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64wcsncpy
                          • String ID:
                          • API String ID: 2569467992-0
                          • Opcode ID: 415c683238fff835ea9fbc983c88cdb70b7cd971ea903092e9f439e9d1fa63cf
                          • Instruction ID: bf16e672f3a8e8fd99073b2a9ef61ad7ce16bf165b14e2098c4aa157551b2eb3
                          • Opcode Fuzzy Hash: 415c683238fff835ea9fbc983c88cdb70b7cd971ea903092e9f439e9d1fa63cf
                          • Instruction Fuzzy Hash: AC914C32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: f1098198f6168ecdf32857369abcfc7f53b75b40678fe3b64b54c61354048ffb
                          • Instruction ID: 1a1020dcd48bb9bf83f4a63a3428f4ac71b05acccf21429b5c075519e3c6cfd1
                          • Opcode Fuzzy Hash: f1098198f6168ecdf32857369abcfc7f53b75b40678fe3b64b54c61354048ffb
                          • Instruction Fuzzy Hash: 2C918F72604B4486FB6B8B27E8847EA37A2F74DBD4F540116EB59476F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 4c2d30910c2e10d71f1f3b0a7a0f4ee9575a20374b4a50be6d25dc3bb15096ef
                          • Instruction ID: 6c7b90d95a89ea685e13d25b61d101c4901c2a152d1e412b2160064fedab9297
                          • Opcode Fuzzy Hash: 4c2d30910c2e10d71f1f3b0a7a0f4ee9575a20374b4a50be6d25dc3bb15096ef
                          • Instruction Fuzzy Hash: 7C918E72605B4486FB6B8B27E8847EA37A2F74DBE4F540116EB5947AF5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 27ed310dd99595223477ae8e43afae19f61164b49bfea35b1ff7e77e756977dd
                          • Instruction ID: 31b78f13ecf3002c3af99b6ea8f2b4ef0819c5109ee106b7d46ad87862387309
                          • Opcode Fuzzy Hash: 27ed310dd99595223477ae8e43afae19f61164b49bfea35b1ff7e77e756977dd
                          • Instruction Fuzzy Hash: 10917E32205B4486FB6B8B27E8847EA37A1F74DBD4F140116EB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                          • String ID:
                          • API String ID: 3716859204-0
                          • Opcode ID: a1d91ca8247e362ce5a623d8193d83c1c664787a788d07846d16936879579a5c
                          • Instruction ID: ec234962b13d178b42309615d8df4c5039b25698c428ffcd1d24dbf2f79de6f4
                          • Opcode Fuzzy Hash: a1d91ca8247e362ce5a623d8193d83c1c664787a788d07846d16936879579a5c
                          • Instruction Fuzzy Hash: 2F915C32205B4486EB6B8B27E8847EA37A1F74DBE4F540216EB99477F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 5b87051794c7af072f37d5d25cbd1c2ffc71a1520e672cc558c5dbb2d63de8c0
                          • Instruction ID: 344ff416124dd653dbb96123a3dffad4b5a0d64797bbef8d49c2f6ab0c520048
                          • Opcode Fuzzy Hash: 5b87051794c7af072f37d5d25cbd1c2ffc71a1520e672cc558c5dbb2d63de8c0
                          • Instruction Fuzzy Hash: 61915B32205B4486EB6B8B27E8847EA37A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 982479a1a0a5a53414f34d5ffac0a55d4d3febbd094f1bd67d534ce64bf0ec6a
                          • Instruction ID: 0413031df576e1020b04a9fccf7892dc5b7797c854c0db7859750ace68531620
                          • Opcode Fuzzy Hash: 982479a1a0a5a53414f34d5ffac0a55d4d3febbd094f1bd67d534ce64bf0ec6a
                          • Instruction Fuzzy Hash: 6B918E72604B4486FB6B8B27E8847EA37A2F74DBE4F140116EB5947AF5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: e084672833f8baa16801c8ffda01b13c1b6c26ae669819110bd18984a17125f1
                          • Instruction ID: 5b975250c610673d0182c6d9c2ec59a61e7e9cb1575fd3bec64b0619883ab062
                          • Opcode Fuzzy Hash: e084672833f8baa16801c8ffda01b13c1b6c26ae669819110bd18984a17125f1
                          • Instruction Fuzzy Hash: 7B918D72604B4486FB6B8B27E8847EA37A2F74DBE4F140116EB5947AF5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: f6b083f2bdf2a0a24f032f51ec2db5f53d399c26fb60030366ea68a2386acb57
                          • Instruction ID: 78785c3cbe08bfba237a871a8be01342995a798ea286aa3158a64a0582c0db41
                          • Opcode Fuzzy Hash: f6b083f2bdf2a0a24f032f51ec2db5f53d399c26fb60030366ea68a2386acb57
                          • Instruction Fuzzy Hash: 8D916E72605B4486FB6B8B27E8847EA37A1F74DBD4F140116EB99876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountThreadTick$AttachInput$ClipboardCloseFocusGlobalMessagePeekProcessUnlockWindow
                          • String ID:
                          • API String ID: 1514730375-0
                          • Opcode ID: f572fedb93ac6b7fe24bc6b9c651928146c8771fc6e345f4d4eeb9869bd4cef8
                          • Instruction ID: 96bac0e8e5e77b4f2163b33f4fc03b0230279ff3379999c17acd1349d6c8139c
                          • Opcode Fuzzy Hash: f572fedb93ac6b7fe24bc6b9c651928146c8771fc6e345f4d4eeb9869bd4cef8
                          • Instruction Fuzzy Hash: B2915B32205B4486EB6B8B27E8847EA37A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                          • String ID:
                          • API String ID: 3716859204-0
                          • Opcode ID: eb81dae49608c597d6f0d09fbc239601219ed74b9ef61df500a809e415e80b97
                          • Instruction ID: 7c96fe15aaf7ecfb45a2b247e79f3f60fd9131d43abb5ea8d5308fa8b7a118f8
                          • Opcode Fuzzy Hash: eb81dae49608c597d6f0d09fbc239601219ed74b9ef61df500a809e415e80b97
                          • Instruction Fuzzy Hash: B3915B32205B4486EB6B8B27E9847EA37A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: cf198bf208e478cb68fdb10eaa8f3c6f0d99751b25096473482969d9c0a83209
                          • Instruction ID: e931b57f36da642202082fb60b9f0c9f5eeddd0b4999ce06b0b962905996f550
                          • Opcode Fuzzy Hash: cf198bf208e478cb68fdb10eaa8f3c6f0d99751b25096473482969d9c0a83209
                          • Instruction Fuzzy Hash: E1915B32605B4486EB6B8B27E8847EA37A1F74DBE4F540116EB99877F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 6ef569647951fba4fcbde7260c5a91f055d970317f82cd66c78e6b91f611ca8d
                          • Instruction ID: f28bc8e1c17e3edb1ced185b2a29caefd651e13fb55631d2874a4a57b45ca70a
                          • Opcode Fuzzy Hash: 6ef569647951fba4fcbde7260c5a91f055d970317f82cd66c78e6b91f611ca8d
                          • Instruction Fuzzy Hash: 8D916D72605B4486FB6B8B27E8847EA37A1F74DBE4F140116EB99876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 07f46211e331233bd5cd8b9b9bbf39097b81fa7f9a80487e24c9da01b5ce1527
                          • Instruction ID: 669680f96d05d153048a8387d952206420b5a8b546a1ae8e54adcc3dab17e824
                          • Opcode Fuzzy Hash: 07f46211e331233bd5cd8b9b9bbf39097b81fa7f9a80487e24c9da01b5ce1527
                          • Instruction Fuzzy Hash: 4D917D32205B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
                          • String ID:
                          • API String ID: 2214806735-0
                          • Opcode ID: ef1e85978a3c774d77df60036513ab7ec6975295f4934b26e2753079480d478e
                          • Instruction ID: 1b9f265d167a671e227a763db2c1f3e9e6f23b0d94f2bb874b6eb0ee508cd3c4
                          • Opcode Fuzzy Hash: ef1e85978a3c774d77df60036513ab7ec6975295f4934b26e2753079480d478e
                          • Instruction Fuzzy Hash: A0917D32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Process$ClipboardCloseCurrentGlobalMessageOpenPeekTokenUnlock
                          • String ID:
                          • API String ID: 3060718303-0
                          • Opcode ID: 40ae8e21d320265fad0e56d18848516c29eb6af01428a363d9b25acb385a2a0f
                          • Instruction ID: e8eef86d5ae17e8620fed958b8f88c878c59cd2bcea1042b3022c8b450eacb19
                          • Opcode Fuzzy Hash: 40ae8e21d320265fad0e56d18848516c29eb6af01428a363d9b25acb385a2a0f
                          • Instruction Fuzzy Hash: 92817D32604B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekTextUnlockWindow
                          • String ID:
                          • API String ID: 189804293-0
                          • Opcode ID: 629f403c149ad131ba46cfbde42d5b526a18638fd3913594a781291030704684
                          • Instruction ID: df7b99055a4d6d69e48f2e4e0e61b5ef2a143bbd2d416ebc8f55dc15b24e6c7a
                          • Opcode Fuzzy Hash: 629f403c149ad131ba46cfbde42d5b526a18638fd3913594a781291030704684
                          • Instruction Fuzzy Hash: F3916D32605B4486FB6B8B27E8847EA37A1F74DBE4F140116EB99876F5CB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: da2ce0c8d23c42d93887ed50d8489e822b3440951fec8c2922b555ff73ae307a
                          • Instruction ID: 10f9424c96fb4923b79ea8e5a96797eb67ba2867288b7e811c903150e24e002c
                          • Opcode Fuzzy Hash: da2ce0c8d23c42d93887ed50d8489e822b3440951fec8c2922b555ff73ae307a
                          • Instruction Fuzzy Hash: 75917E72205B4486FB6B8B27E9847EA37A1F74DBE4F540116EB59876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 1ca0e3d8e17ee9446e28957d14ac4a1d2e5b904371399d8c2a164369e88fe708
                          • Instruction ID: 24258ca19ae4cc376ea46207ffc257fe1ddea7c0f722d8a74cb40f6ec1306204
                          • Opcode Fuzzy Hash: 1ca0e3d8e17ee9446e28957d14ac4a1d2e5b904371399d8c2a164369e88fe708
                          • Instruction Fuzzy Hash: 37916C32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB99876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
                          • String ID:
                          • API String ID: 2214806735-0
                          • Opcode ID: dde1aeaaf90336d2fc46c23ad91a285f4aa9a6fe64ceb62572d987eb3cab4f39
                          • Instruction ID: f4b5add273d0fc966654b3fce579459dc2babcb329dc3ed7ac6f4aca179fd4af
                          • Opcode Fuzzy Hash: dde1aeaaf90336d2fc46c23ad91a285f4aa9a6fe64ceb62572d987eb3cab4f39
                          • Instruction Fuzzy Hash: 48916C32205B4486FB6B8B27E8847EA37A1F74DBE4F140116EB99876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Thread$ChildClassClipboardCloseEnumGlobalInfoMessageNamePeekProcessUnlockWindowWindows
                          • String ID:
                          • API String ID: 3620957724-0
                          • Opcode ID: dba4be9a50893d4aa64331196a99e08e4992e249535a4a7cf8fd0e11efd748f6
                          • Instruction ID: 5342021b143bdc1090963f33cd24d0e924647c68026651b111a1d6649862ad83
                          • Opcode Fuzzy Hash: dba4be9a50893d4aa64331196a99e08e4992e249535a4a7cf8fd0e11efd748f6
                          • Instruction Fuzzy Hash: 72916C32605B4486FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: c4edaf89c082fd469dff7f6c6d6a663f2ab7d88f9557c7a3d3021fb490b3859b
                          • Instruction ID: 9424ed7b05e927d95de6321d7865553832f752b29e7515fab94bc8ebd5c18b87
                          • Opcode Fuzzy Hash: c4edaf89c082fd469dff7f6c6d6a663f2ab7d88f9557c7a3d3021fb490b3859b
                          • Instruction Fuzzy Hash: 5B916C32205B4486FB6B8B27E8847EA37A1F74DBE4F140116EB59876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 5b11433e4228f3a40c407e4eb170ce8cb1cd2d62b0839c9ca2fc3423a31e6850
                          • Instruction ID: 2a4464c558120b9bc34a46f78f5c5d514167ffb0976ea61e81f52cd4714b0ba1
                          • Opcode Fuzzy Hash: 5b11433e4228f3a40c407e4eb170ce8cb1cd2d62b0839c9ca2fc3423a31e6850
                          • Instruction Fuzzy Hash: DC916C32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5CB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekRectUnlockWindow
                          • String ID:
                          • API String ID: 1900757344-0
                          • Opcode ID: a84244b1ce70672e785627fa6fdc6ad2bd3b8fa01e7674ebaaa1f4eb142b2289
                          • Instruction ID: 67ac19c71e42195e5262dd0d8cad40e380733773937a965a44bb403cea9e51bc
                          • Opcode Fuzzy Hash: a84244b1ce70672e785627fa6fdc6ad2bd3b8fa01e7674ebaaa1f4eb142b2289
                          • Instruction Fuzzy Hash: 8C916C32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5A876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 173a6afc6323294aa997bbb466fef1780b22661fa527c2534d3d053820e57ccd
                          • Instruction ID: 9440abe3a64c4db6812e906fe1370d650aeff63a1f0b06088cb955a7481e0fbd
                          • Opcode Fuzzy Hash: 173a6afc6323294aa997bbb466fef1780b22661fa527c2534d3d053820e57ccd
                          • Instruction Fuzzy Hash: 5F917D72604B4486FB6B8B27E8847EA37A1F74DBE4F140116EB9A476F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 061a643c5c5a8a14a2779ba59162ff98b496b7aca57dc3ae0d2362544107ce71
                          • Instruction ID: 6eefc40940ca09f159ca5c7246e1d907d071a48149073d85130ec095accb8e8d
                          • Opcode Fuzzy Hash: 061a643c5c5a8a14a2779ba59162ff98b496b7aca57dc3ae0d2362544107ce71
                          • Instruction Fuzzy Hash: 6D916C32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 9d63c7016d4b458ecf25fc668e17d9dfac1895e9b1bd7f553a99c83347f21fd7
                          • Instruction ID: 5e704c364b93265649a2bd6fb811fd93d6a35125057efdc3f5da019cf8c29324
                          • Opcode Fuzzy Hash: 9d63c7016d4b458ecf25fc668e17d9dfac1895e9b1bd7f553a99c83347f21fd7
                          • Instruction Fuzzy Hash: 5C818F32605B4486FB6B8B27E9947EA37A1F74DBE4F140116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 42a0b727ba8a1f9e9761d0a73f35d2f3f92bb278d63066a1faecfb78e9b321a2
                          • Instruction ID: db0a3f3c228e83994f23b7e2916537c9f0d002c03a785eca40e0b8813e94f91d
                          • Opcode Fuzzy Hash: 42a0b727ba8a1f9e9761d0a73f35d2f3f92bb278d63066a1faecfb78e9b321a2
                          • Instruction Fuzzy Hash: B2918F32204B4486FB6B8B27E8847EA37A1F74DBE4F140116EB59876F5DB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: a18b17933b0b32361a77eb7e2d4ed97111ef436377f6128a1a4bcc7e7952753a
                          • Instruction ID: 9ede9284b01ad9c54fa9553e724d8f5eaf42f20ea0b45159e10fb819c5f11bf2
                          • Opcode Fuzzy Hash: a18b17933b0b32361a77eb7e2d4ed97111ef436377f6128a1a4bcc7e7952753a
                          • Instruction Fuzzy Hash: 0F916D32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseFullGlobalMessageNamePathPeekPrivateProfileStringUnlock
                          • String ID:
                          • API String ID: 3404763234-0
                          • Opcode ID: 11ed4fc210e3a2636d341c778eeb7996032a904755812cd576aaef053781fffa
                          • Instruction ID: 06b1df827d00f5cc263e926aee6349c1da85029c0e5099357a0862ec9fdcbff4
                          • Opcode Fuzzy Hash: 11ed4fc210e3a2636d341c778eeb7996032a904755812cd576aaef053781fffa
                          • Instruction Fuzzy Hash: 49917D32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: f98438cea948df779e20665adafd5479e47d97576d0e9c0082b54cf0c31a5d3c
                          • Instruction ID: a2fbf90fff0e3be7ab64733bd63c16797d57b2a71fd77f5f22b8deaea7f4c573
                          • Opcode Fuzzy Hash: f98438cea948df779e20665adafd5479e47d97576d0e9c0082b54cf0c31a5d3c
                          • Instruction Fuzzy Hash: AB917D32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalLengthMessagePeekTextUnlockWindow
                          • String ID:
                          • API String ID: 1215013059-0
                          • Opcode ID: 837c88f0561fb2f5b2940170bf68a8fceebe6472f276ebd56d3ff9e5ac028c25
                          • Instruction ID: 0d790d44f442801a445b807c733676b31b39988f1085c2c25e3ddae299143a02
                          • Opcode Fuzzy Hash: 837c88f0561fb2f5b2940170bf68a8fceebe6472f276ebd56d3ff9e5ac028c25
                          • Instruction Fuzzy Hash: 22918D32204B4486FB6B8B27E8847EA37A1F74DBE4F140116EB59876F5CB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 047946d057020d2b9b1979844ad6ddf9be6c6a0df40b46c8d8faa38e6b8257c6
                          • Instruction ID: 9f0eb75cd89bb04b9add501b3d1ead90f144888db0ae6aeda65dbfa1ea8aabaa
                          • Opcode Fuzzy Hash: 047946d057020d2b9b1979844ad6ddf9be6c6a0df40b46c8d8faa38e6b8257c6
                          • Instruction Fuzzy Hash: 67917D32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalLabelMessagePeekUnlockVolumewcsncpy
                          • String ID:
                          • API String ID: 2345973108-0
                          • Opcode ID: d6b886f57d8cda43ef24c5f468a86e6954c47d9b9e4d57b3ac8a5e7ac7a72263
                          • Instruction ID: ca23576fb3e9c62541aeebe53bcf8a66233eaaad1aba6f20bf7ccb619e02dd22
                          • Opcode Fuzzy Hash: d6b886f57d8cda43ef24c5f468a86e6954c47d9b9e4d57b3ac8a5e7ac7a72263
                          • Instruction Fuzzy Hash: B3917D32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 9fe177a72c0fc88598663fc4ee1e677a1764707fc1584c010177d3b373544c96
                          • Instruction ID: 753e27b9e2f07bd0b1bdc4deb1d4e87f0bcb2831e7bcf10d373efb69f35fdccc
                          • Opcode Fuzzy Hash: 9fe177a72c0fc88598663fc4ee1e677a1764707fc1584c010177d3b373544c96
                          • Instruction Fuzzy Hash: 42918D32604B4486FB6B8B27E8847EA37A1F74DBE4F140116EB5A876F5CB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseCurrentDirectoryGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1560712716-0
                          • Opcode ID: bf7822928ec2ae7e79ce3103a483cba2248cc9c1a0f710a8c0a2778f789376e5
                          • Instruction ID: ab5391d23010a6528cc73d771612f2c7c91864c29ad9cd5b0cf3bcf275f2dd77
                          • Opcode Fuzzy Hash: bf7822928ec2ae7e79ce3103a483cba2248cc9c1a0f710a8c0a2778f789376e5
                          • Instruction Fuzzy Hash: D9818E32205B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: b16efcc0f84c88b84466d20a564407b39d3c1f9511cc292afa4a62c45c1b1b49
                          • Instruction ID: ad7d9d6f310713913664f55b3129814298cb92de64e1bd25842e427ba837d311
                          • Opcode Fuzzy Hash: b16efcc0f84c88b84466d20a564407b39d3c1f9511cc292afa4a62c45c1b1b49
                          • Instruction Fuzzy Hash: 43917D32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 59561b27362d23aaf235ea90483b9bb8b54bcfcbc7fb99fcc068a9a5925eebe5
                          • Instruction ID: 8d5b52684aa429c7ee70d31da494f3550016cab0babc622c643ff50bf017b42f
                          • Opcode Fuzzy Hash: 59561b27362d23aaf235ea90483b9bb8b54bcfcbc7fb99fcc068a9a5925eebe5
                          • Instruction Fuzzy Hash: C8819232604B4486FB6B8B27E9847EA37A1F74DBD4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: f1424296825ddbbba576e43ea2a48598f59e524c0571be45651f7ef6b9620271
                          • Instruction ID: 44bea928dbf1d718e2dcfe6261f4a1a9470d8100de863f413b05a363a9f97bca
                          • Opcode Fuzzy Hash: f1424296825ddbbba576e43ea2a48598f59e524c0571be45651f7ef6b9620271
                          • Instruction Fuzzy Hash: 9E819F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountInternetTick$CloseOpen$ClipboardGlobalHandleMessagePeekUnlock_wcstoi64
                          • String ID:
                          • API String ID: 2751744677-0
                          • Opcode ID: 4627757b0ea7cb86f3f982d822703c6b898ea33fd38c1ea717bcde7e7a5fa0f7
                          • Instruction ID: 59822f3d5b07b7ced912f3e283c707f6eeb56b668b6f5dfc93c5f8bd2cf687a7
                          • Opcode Fuzzy Hash: 4627757b0ea7cb86f3f982d822703c6b898ea33fd38c1ea717bcde7e7a5fa0f7
                          • Instruction Fuzzy Hash: E0817E72605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 41a62a7cf3679477bcbeb62de556321d37f494250a21a09b9c93db1359ab7b0f
                          • Instruction ID: c56424a3d6b4971525f2e2c55644c33ff94d256c68e492a0662dba084f8bbd21
                          • Opcode Fuzzy Hash: 41a62a7cf3679477bcbeb62de556321d37f494250a21a09b9c93db1359ab7b0f
                          • Instruction Fuzzy Hash: 4C819F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 88ebf00e30ef03460bb6617ff5b68e33a9ea4adc8f27686ad42661e95b178d96
                          • Instruction ID: a0f36fddbf2f9f0ef99c3758492beb35eb0d2a9d97e1ec55fd9f8b5e26ff385d
                          • Opcode Fuzzy Hash: 88ebf00e30ef03460bb6617ff5b68e33a9ea4adc8f27686ad42661e95b178d96
                          • Instruction Fuzzy Hash: 6D819F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 4be26e19bad265d1be8b62a3a8e49268a23649abee6c02ac8687807246d4ccfb
                          • Instruction ID: 1c648e045f6222d4f0b5210483c4950d2182c770989441a29bff4ece5f60eda5
                          • Opcode Fuzzy Hash: 4be26e19bad265d1be8b62a3a8e49268a23649abee6c02ac8687807246d4ccfb
                          • Instruction Fuzzy Hash: F5819F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 2f4b3a5107ddea9def2681e243fbd52331f592243305cb4445aaa2378cf615a0
                          • Instruction ID: 843cdbde4232ab960134268445edb6fe8b91cc440dd881cd42fe1c311d5a0951
                          • Opcode Fuzzy Hash: 2f4b3a5107ddea9def2681e243fbd52331f592243305cb4445aaa2378cf615a0
                          • Instruction Fuzzy Hash: 86817F32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59476F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 39d9ccd48acccad65618e72ebd32b7b326e53914a27d2ec4fa382c8d6226eb21
                          • Instruction ID: 7bc32861b554b6207ff700170812f361186f41e159a111578335cb62a5b65b82
                          • Opcode Fuzzy Hash: 39d9ccd48acccad65618e72ebd32b7b326e53914a27d2ec4fa382c8d6226eb21
                          • Instruction Fuzzy Hash: C8818E32604B4486FB6B8B27E8847EA37A1F74DBE4F140116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: a2fe03aa038c00a066fe1ffec6fa5df83ad316dfbe7d689758e811ce10424167
                          • Instruction ID: 388c93fe9815bcaf12b95f583dba4f92eab9230c70ada9fcfdc71d9c9871c324
                          • Opcode Fuzzy Hash: a2fe03aa038c00a066fe1ffec6fa5df83ad316dfbe7d689758e811ce10424167
                          • Instruction Fuzzy Hash: A3817E72604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                          • String ID:
                          • API String ID: 3716859204-0
                          • Opcode ID: ed0571caa2e194e47de067d8a865463e5b8bfa31776bef96e89ea6b411d24201
                          • Instruction ID: 284f398e9aebfa9a9e4f1f9babd18a31c934c1a07f67931cd025c6dd20257708
                          • Opcode Fuzzy Hash: ed0571caa2e194e47de067d8a865463e5b8bfa31776bef96e89ea6b411d24201
                          • Instruction Fuzzy Hash: A3817032604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59476F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 08e488afa8beae95a065eff07c7325cd8b56d89e902bb7fbaa6ed0b346bbf207
                          • Instruction ID: acc5ae46533950d723934c21c5127856f6aeeb336105e2bc6e2e6d9baa2cf376
                          • Opcode Fuzzy Hash: 08e488afa8beae95a065eff07c7325cd8b56d89e902bb7fbaa6ed0b346bbf207
                          • Instruction Fuzzy Hash: A4817E32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseDiskFreeGlobalMessagePeekSpaceUnlockwcsncpy
                          • String ID:
                          • API String ID: 833027430-0
                          • Opcode ID: e7ac8fe4df4e4b0bf9f7d7b046fc6689581f8c1ac21e6debab4be05e6b1e5e24
                          • Instruction ID: 13d5ad49d5b4c57439d20eb1836d57f4935b00814c4c4091ffacb55653b4f5cc
                          • Opcode Fuzzy Hash: e7ac8fe4df4e4b0bf9f7d7b046fc6689581f8c1ac21e6debab4be05e6b1e5e24
                          • Instruction Fuzzy Hash: BD817E32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: f8c0675f7541bc91a21350fc0bebbb4302a352eda7eb53790a6f863b24bd6fbe
                          • Instruction ID: 488e8c1877e5b7edf4ef5e91b905c01601a48247350e6d1c2b108052188b01dd
                          • Opcode Fuzzy Hash: f8c0675f7541bc91a21350fc0bebbb4302a352eda7eb53790a6f863b24bd6fbe
                          • Instruction Fuzzy Hash: 90817E32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64
                          • String ID:
                          • API String ID: 3633153638-0
                          • Opcode ID: 48f7a69a59d0d08d243472d7b3690c8542c9cc8c9578b3d4d957d2532f3295ca
                          • Instruction ID: 54cdefd5b911bf3311241e102662463b4c44ef62bcb39df98a08a56aa94ba3c8
                          • Opcode Fuzzy Hash: 48f7a69a59d0d08d243472d7b3690c8542c9cc8c9578b3d4d957d2532f3295ca
                          • Instruction Fuzzy Hash: AF817E32605B4486FB6B8B27E9847EA37A1F74DBE4F540116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
                          • String ID:
                          • API String ID: 4284707085-0
                          • Opcode ID: 315438c8c7d6a4a602814d5add7dbd5beca9041b1e56924a73c50d877276a1a2
                          • Instruction ID: 36d95e66d007a8a1702a47698cd9b2a5230d39607dfe82fb474ea644de980a3e
                          • Opcode Fuzzy Hash: 315438c8c7d6a4a602814d5add7dbd5beca9041b1e56924a73c50d877276a1a2
                          • Instruction Fuzzy Hash: 1B818E32605B4086FB6B8B27E9847EA37A1F74DBE4F540116EB5947AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 3a44e7329809af67752385937a7bc0072473067245a4f1cc64042b2da5af6520
                          • Instruction ID: d372c14478e038978bf52c0b34d9c52277e846fd01df17490c32a7e7b1a393da
                          • Opcode Fuzzy Hash: 3a44e7329809af67752385937a7bc0072473067245a4f1cc64042b2da5af6520
                          • Instruction Fuzzy Hash: A0819F32605B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5A876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 9304ff9ad1e6de7bbaf70da56b9a85d74f15dd18fb514a0f4b83ab2bdb7009cb
                          • Instruction ID: 5cf0ce040c48bd4e97a3c20b0c30d7139442da201f03fc45af4066b4fa01dbfd
                          • Opcode Fuzzy Hash: 9304ff9ad1e6de7bbaf70da56b9a85d74f15dd18fb514a0f4b83ab2bdb7009cb
                          • Instruction Fuzzy Hash: 60817E32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$CloseCreateMessageMutexSleepThread$ClipboardCodeExitGlobalHandlePeekPostUnlock
                          • String ID:
                          • API String ID: 4035754557-0
                          • Opcode ID: a7cc1eb8420fed0d1a09540ad23359c290899aaa565be889b66b3a98e42bda5e
                          • Instruction ID: 8ebbecce5b3cf4afea8737ae8c3e1fd49b6e4e66243db8e53ef78ea822ad837d
                          • Opcode Fuzzy Hash: a7cc1eb8420fed0d1a09540ad23359c290899aaa565be889b66b3a98e42bda5e
                          • Instruction Fuzzy Hash: 99918032605B4486FB6B8B27E9847EA3BA1F74DBE4F540116EB59476F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalKeyboardLayoutMessagePeekUnlock
                          • String ID:
                          • API String ID: 2243892272-0
                          • Opcode ID: ed3d96e106641cc515b40f6efebf4989b36f4e94b6e11a81dda9c4ca462b4597
                          • Instruction ID: c96983479b17fdde475b0f50e44497174fa8529c2231265a3e3e9b4271bfab20
                          • Opcode Fuzzy Hash: ed3d96e106641cc515b40f6efebf4989b36f4e94b6e11a81dda9c4ca462b4597
                          • Instruction Fuzzy Hash: 6C817E32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 49d8334176c75d6f457d06d1597ab7905e90cd0b359a3694d0c5187c241fc8ae
                          • Instruction ID: d46fbba221f6a1d37ce4e054acfb204c077dea55d108b1fe5ebb107d54883e65
                          • Opcode Fuzzy Hash: 49d8334176c75d6f457d06d1597ab7905e90cd0b359a3694d0c5187c241fc8ae
                          • Instruction Fuzzy Hash: 7A818E32204B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C880C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ErrorLast$ClipboardCloseDeleteFileGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 3770565981-0
                          • Opcode ID: fca966184b97ff99c2202c2cffaaf49e39dc0756198241081fc073f710ce5856
                          • Instruction ID: b3e314504f673dbff29ef19cce151bf1b2c8a462f4cf57da66a9264526308a86
                          • Opcode Fuzzy Hash: fca966184b97ff99c2202c2cffaaf49e39dc0756198241081fc073f710ce5856
                          • Instruction Fuzzy Hash: BA817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5987AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseFileFullGlobalMessageNameOperationPathPeekUnlock
                          • String ID:
                          • API String ID: 1286959346-0
                          • Opcode ID: a7678a4eb37c7856788aa3b966e46e08ab8ef19bc6ed9677dd83ffbb8c21a294
                          • Instruction ID: 282c9c5b06df05da21d7555aaac9eb50ee554fe5c94c68c710db9e0ae339d396
                          • Opcode Fuzzy Hash: a7678a4eb37c7856788aa3b966e46e08ab8ef19bc6ed9677dd83ffbb8c21a294
                          • Instruction Fuzzy Hash: 18817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceMessagePeekUnlock
                          • String ID:
                          • API String ID: 2299052934-0
                          • Opcode ID: 0104c631145a9c41c6ec00e14aa56b13a350430b55082aa6c07ab7bdd77dfeea
                          • Instruction ID: 0b2d16a5654d4c94aac667455498a9d4df41dd4e176d09450f7ff70a92a41f18
                          • Opcode Fuzzy Hash: 0104c631145a9c41c6ec00e14aa56b13a350430b55082aa6c07ab7bdd77dfeea
                          • Instruction Fuzzy Hash: 37817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                          • String ID:
                          • API String ID: 1853169715-0
                          • Opcode ID: 1c61e666939743d5550e037f10495d48e2c5357932429bd191e87c7c580b4df1
                          • Instruction ID: 96bc4645ef56079efb1bde426f103051dc7d766bc55b46cb77d03ca562ad0f19
                          • Opcode Fuzzy Hash: 1c61e666939743d5550e037f10495d48e2c5357932429bd191e87c7c580b4df1
                          • Instruction Fuzzy Hash: A7817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                          • String ID:
                          • API String ID: 1853169715-0
                          • Opcode ID: b3bf61b9bffe90231e36b2913cfc248b2d0ddec02578d8c46df1969e080e1f50
                          • Instruction ID: 8039ba63d986673bac7df5f99ff1dba696d6f1737c78e742a1ab4ed3a1abc4e2
                          • Opcode Fuzzy Hash: b3bf61b9bffe90231e36b2913cfc248b2d0ddec02578d8c46df1969e080e1f50
                          • Instruction Fuzzy Hash: 17817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                          • String ID:
                          • API String ID: 1853169715-0
                          • Opcode ID: 90393b3619a9850c0766f72155887cdaf984568cf434a9bc876d0119a1f49d28
                          • Instruction ID: 44e588b291fcd8a595d1debe30c81cf04398933b86d75c66718a63848d64ba11
                          • Opcode Fuzzy Hash: 90393b3619a9850c0766f72155887cdaf984568cf434a9bc876d0119a1f49d28
                          • Instruction Fuzzy Hash: 21817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5A876F5DB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 01d91744b92c99e4e4ba1141ea1e0387663e76ccc1dde7c4497aa3c955286f76
                          • Instruction ID: 1121d0e18e917d98a098e62e5cc226ff3350cc020e560f5dc6d2de8d00b5e570
                          • Opcode Fuzzy Hash: 01d91744b92c99e4e4ba1141ea1e0387663e76ccc1dde7c4497aa3c955286f76
                          • Instruction Fuzzy Hash: 39818232605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59476F5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: eba7798dbae48b1ba88e6349ded33780353a52ca1690976ea72378795a0f433f
                          • Instruction ID: 417f7f9809944cb6ef4b4e446cd646a462c1508e640a5cea2031b9a92b7f3bac
                          • Opcode Fuzzy Hash: eba7798dbae48b1ba88e6349ded33780353a52ca1690976ea72378795a0f433f
                          • Instruction Fuzzy Hash: 47817E32604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 56c2dfc6c71aa1073454b456e27f6fac8f04d85d296b0f95d1da0e9d5beaf033
                          • Instruction ID: 946bf70060a4496f07085cf928d23265b6333c881d51755901fca5392dc4c2e8
                          • Opcode Fuzzy Hash: 56c2dfc6c71aa1073454b456e27f6fac8f04d85d296b0f95d1da0e9d5beaf033
                          • Instruction Fuzzy Hash: 1A819032604B4486FB6B8B27E9947EA37A1F74DBE4F540116EB59876F5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 67a0ffef624d068fd77d794ef6a4af3243ad794c267c5f14a77d4604a027c6c9
                          • Instruction ID: 5e2923f897fe513f2e3a7ab9933315d18b27bae760ae73d00eaa2373f2707fc5
                          • Opcode Fuzzy Hash: 67a0ffef624d068fd77d794ef6a4af3243ad794c267c5f14a77d4604a027c6c9
                          • Instruction Fuzzy Hash: F6819032604B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5947AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 942a8e793a1e3dbeb16fa40905da1a85a014d97b6bef594aa63eefbfc8b00b57
                          • Instruction ID: a8d325e737a768574cd6545b6052048c37d5ca1428fe52325d3bd1e965384067
                          • Opcode Fuzzy Hash: 942a8e793a1e3dbeb16fa40905da1a85a014d97b6bef594aa63eefbfc8b00b57
                          • Instruction Fuzzy Hash: 6481AF32604B4486FB6B8B27E8847EA37A1F74DBE4F140116EB5987AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 9b5ba570ec31094884f057654934e19de2f50ca00308abab79bd997d3d7a7b60
                          • Instruction ID: cab89d96ecfced6d3122158effd6b8ee9174d2f78fc40e5ec4ef27a80affa3ab
                          • Opcode Fuzzy Hash: 9b5ba570ec31094884f057654934e19de2f50ca00308abab79bd997d3d7a7b60
                          • Instruction Fuzzy Hash: 4D818032605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5947AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 5c1fa7ba3227e0435e345ed5976622e0fbdc208c7db3ae82c3bf1a990781492e
                          • Instruction ID: 9352bc3e8c24dcb03e778793e608d2337ff5949a586c76a5c309c754917cbfc7
                          • Opcode Fuzzy Hash: 5c1fa7ba3227e0435e345ed5976622e0fbdc208c7db3ae82c3bf1a990781492e
                          • Instruction Fuzzy Hash: 65818032605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5947AF5CB38D881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: fc86f5a48bc6a22df2cf1cf04a1df1fa59a1e651537b75eb438ea0b2b9fa8405
                          • Instruction ID: 63eabfd3ca3112bf9c69a9dc4f9df41c637428e045b745ab0acae390d5e9b09d
                          • Opcode Fuzzy Hash: fc86f5a48bc6a22df2cf1cf04a1df1fa59a1e651537b75eb438ea0b2b9fa8405
                          • Instruction Fuzzy Hash: CF818F32605B4486FB6B8B27E9847EA37A1F74DBE4F140116EB5947AF5DB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                          • String ID:
                          • API String ID: 1623861271-0
                          • Opcode ID: 685e7f4463b27bd559a90ae5c5597bc5337d4b63c7bb8408e63f433d082069ac
                          • Instruction ID: 8d7e1506114d21b733200c15426dfb3d4befcb711897520b252e94cf035e0d7d
                          • Opcode Fuzzy Hash: 685e7f4463b27bd559a90ae5c5597bc5337d4b63c7bb8408e63f433d082069ac
                          • Instruction Fuzzy Hash: 2C817F32605B4486FB6B8B27E9847EA37A1F74DBE4F540216EB5947AF5CB38C881C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ChildEnumWindows$wcsncpy
                          • String ID:
                          • API String ID: 725298479-0
                          • Opcode ID: b36e38b7f301f04a6fb8f99bfb8e92079eb717acc728999b3c6f8ba826ba485c
                          • Instruction ID: bc5b4b8f32d5bcd4435bf222b7f7f2879869d75ca93a57dd6b8a9757431a787b
                          • Opcode Fuzzy Hash: b36e38b7f301f04a6fb8f99bfb8e92079eb717acc728999b3c6f8ba826ba485c
                          • Instruction Fuzzy Hash: D7413D32609BC085EB369F5AB4403DAB2A5FB88BD0F584215EB9903BA8DF3CC555CB44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Timer$CountKillTick_wcstoi64
                          • String ID: Out of memory.
                          • API String ID: 806017027-4087320997
                          • Opcode ID: aa932d044b2e9a63232b77e8fff9658fd00e30ef2c8930f6a4b4ad2916d85146
                          • Instruction ID: 212d1dd19ed869c48b7963275d22c0695bdfb3476e1baecfbf140587e37c6e17
                          • Opcode Fuzzy Hash: aa932d044b2e9a63232b77e8fff9658fd00e30ef2c8930f6a4b4ad2916d85146
                          • Instruction Fuzzy Hash: 59919F7290468485FBABAB2795503EA76E0F79CBD5F48402EEB45072F5DBB8CC91C340
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0
                          • API String ID: 0-4108050209
                          • Opcode ID: f21670707a2bbf07f7714e3bb40276a828c7d7259b48a8a7ef12e5184b7c7181
                          • Instruction ID: df47dac0959f8134fbde6b7bf792d9b721d089bc68ee7e9e8f38af09b3997321
                          • Opcode Fuzzy Hash: f21670707a2bbf07f7714e3bb40276a828c7d7259b48a8a7ef12e5184b7c7181
                          • Instruction Fuzzy Hash: 7571DE32601A1582EF669B1796987FE6395F78CBE4F898025FF49477F5DB38C8828304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSendTextWindowfree
                          • String ID: $.
                          • API String ID: 1940615249-3929174939
                          • Opcode ID: 5fb0ae0e1832d8572275ef994c34b68b143e2b303fede046c2d74b27f3dc5ee9
                          • Instruction ID: d88c4c12fb166030a45d8ba9f873245aa0f10129152134ecffbe905dc60b18a5
                          • Opcode Fuzzy Hash: 5fb0ae0e1832d8572275ef994c34b68b143e2b303fede046c2d74b27f3dc5ee9
                          • Instruction Fuzzy Hash: E651AD77A0565081FBBA5B07A6907FA73A1B72D7E0F544317FF66076F4EA38CA818201
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$Messagefree
                          • String ID: call
                          • API String ID: 3699376206-3431870270
                          • Opcode ID: 7b8c2080cb8e60683dd709e19314054af6cf4d8a22ae781fd583c4bfa54db0f9
                          • Instruction ID: 2463da98c1d5021eb6649a4fdd344b049f2e35d5f6e0ff27b280f045162bfa6f
                          • Opcode Fuzzy Hash: 7b8c2080cb8e60683dd709e19314054af6cf4d8a22ae781fd583c4bfa54db0f9
                          • Instruction Fuzzy Hash: CF618FB6604B808AE766CF22F8507EA77A5F78CB98F544125FB4A47BB9DB34C540CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ClientCreateLongObjectRectReleaseSelect
                          • String ID: Can't create control.$SysLink
                          • API String ID: 2656910855-3028581624
                          • Opcode ID: 187dacbb8b5fff3ff1a32d70668f6491b4fea5f9171416759f30824f2cabf329
                          • Instruction ID: 2cfabf15e7c1e96764ab6fee26cfd8654ef4d23826f6ae420ef9f437b0e89eaa
                          • Opcode Fuzzy Hash: 187dacbb8b5fff3ff1a32d70668f6491b4fea5f9171416759f30824f2cabf329
                          • Instruction Fuzzy Hash: 9B21F576615B448AE752CF2AE8847D9B3A0F74C798F144026EF4D97B78DB38C985CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ClientCreateLongObjectRectReleaseSelect
                          • String ID: Can't create control.$static
                          • API String ID: 2656910855-3511495095
                          • Opcode ID: 74a460700f89ba3631fccc509e9a503001f12f21eafbafbeaf1e3d31e356fc6d
                          • Instruction ID: 24443537530292a5bba8a5bbc44f5f6151a38f243848a12f11cb1f8d14d4f26f
                          • Opcode Fuzzy Hash: 74a460700f89ba3631fccc509e9a503001f12f21eafbafbeaf1e3d31e356fc6d
                          • Instruction Fuzzy Hash: 9521F576605B448AE752CF2AE8847D9B3A0F74C7A4F044026EF4D57B78DB38C985CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountDragFinishTick
                          • String ID:
                          • API String ID: 1673030553-0
                          • Opcode ID: 01df87b0922dd57c3e8948f1aeda4217f513127ccb59913a8c8eda0a69fe485d
                          • Instruction ID: 7b69fe061eee21579dad47f06d4dde0caa1ddb8446948a0e14fc71858eda8b36
                          • Opcode Fuzzy Hash: 01df87b0922dd57c3e8948f1aeda4217f513127ccb59913a8c8eda0a69fe485d
                          • Instruction Fuzzy Hash: 93C16BB2604A818AEB66CB2BB9543FA27B5B74DBD4F140226EB59177F5DB34C840C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ChildClientCtrlEnumMessagePostProcScreenWindows
                          • String ID:
                          • API String ID: 3343987823-0
                          • Opcode ID: b0630ac4f33461f75fd2b6dd3143a00c5bd4e1395a37f40a2f4c0b4a95c8c59e
                          • Instruction ID: c2a937fc99a2798bfebccf7440ac5c42781a5f893cee02305bf90dac8d5344bc
                          • Opcode Fuzzy Hash: b0630ac4f33461f75fd2b6dd3143a00c5bd4e1395a37f40a2f4c0b4a95c8c59e
                          • Instruction Fuzzy Hash: 3321E776715641D6EB21CB27A4103D923A0FB8C7E4F540126AF5A53BF4DF38C581DB50
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClipboardCloseCurrentEnumGlobalProcessTimerUnlockWindows
                          • String ID:
                          • API String ID: 555064778-0
                          • Opcode ID: b3aa6cb8a8f5b3ded0d6dcd204e045097ae81de683c751879e1074c6204f0191
                          • Instruction ID: 1aa1a896c3b13dfc405faa8ba5e5f1160fa57b842e8c45d78e90df4c3ad6bb2a
                          • Opcode Fuzzy Hash: b3aa6cb8a8f5b3ded0d6dcd204e045097ae81de683c751879e1074c6204f0191
                          • Instruction Fuzzy Hash: 0621F336205B8685EB56CF62E8807D973A4F74CBE4F584026EB4967634DE78C885CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: String$AllocClearFreeVariant
                          • String ID: _NewEnum
                          • API String ID: 1665868789-1628654690
                          • Opcode ID: 042dffd8c141e6fffe1c0c8fe1b3bbdb352c730511464bf5c0b9ece0aa29003a
                          • Instruction ID: a82e6243127780923fa4700d8ad8e255411475b10b68823beb8c0dc5afa622d8
                          • Opcode Fuzzy Hash: 042dffd8c141e6fffe1c0c8fe1b3bbdb352c730511464bf5c0b9ece0aa29003a
                          • Instruction Fuzzy Hash: C4F16A77200B818AD766CF26D8447DA3BA5F788BD8F158126EB5D47BA8EF34C685C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$KillTimerwcsncpy
                          • String ID: call
                          • API String ID: 2737708082-3431870270
                          • Opcode ID: 9ba35ae6d852eab9cc4f5e2c017a26cf3e1cefcf921943f121d85382a6f7e51f
                          • Instruction ID: f95e5607c05e947690bac7165b8c783dc35a94b9d358afc1e5d52d72a08c9308
                          • Opcode Fuzzy Hash: 9ba35ae6d852eab9cc4f5e2c017a26cf3e1cefcf921943f121d85382a6f7e51f
                          • Instruction Fuzzy Hash: 16914EF6205A8085EB6BDF23B5407EA77A4F74CBC8F584019EB4907ABACB38C954C745
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Unregister$RegisterTimer
                          • String ID:
                          • API String ID: 1006365865-0
                          • Opcode ID: 1a3cb21ec15428c6f4588a15878fa62b0b7a0eac8c9de4d73d5138e3bfe7ad8b
                          • Instruction ID: a3b69c14189f9f8b403d18b09b6e2fe1963c99262312e42ede6895cc9cc4e967
                          • Opcode Fuzzy Hash: 1a3cb21ec15428c6f4588a15878fa62b0b7a0eac8c9de4d73d5138e3bfe7ad8b
                          • Instruction Fuzzy Hash: CA02CFB25156C495FB67CB23A4007E93BE1A31DBD8F08411BEB99076F2C739C999D322
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$DragFinishMessage
                          • String ID:
                          • API String ID: 1078106488-0
                          • Opcode ID: 73c6cef7bf5bdd4db0a1ef89d606f3cee165443a9fa26c6dd9f39f1d0b69d50f
                          • Instruction ID: 487f67eafa9ec0b06bc2557e638422a2908d4080c17c0c50eae0dc19c7f9f609
                          • Opcode Fuzzy Hash: 73c6cef7bf5bdd4db0a1ef89d606f3cee165443a9fa26c6dd9f39f1d0b69d50f
                          • Instruction Fuzzy Hash: 95914BB2204A808AF766CF27B8507EA37A5F74DBD8F154116EB5A57BB9DB34C880C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$DragFinishMessage
                          • String ID:
                          • API String ID: 1078106488-0
                          • Opcode ID: 9404c419219406383be6af2de5a41fc870132e998bf261a6182a226cee6fd205
                          • Instruction ID: e0984bf509c9673f6578d999e0a6bc8d602c368c491bb26309d1f6ea2bd572ec
                          • Opcode Fuzzy Hash: 9404c419219406383be6af2de5a41fc870132e998bf261a6182a226cee6fd205
                          • Instruction Fuzzy Hash: 57815BB2604A808AE766CF27B9503EA77A4F38DBD4F154112EB9617BF9DB34D881C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: DragFinish
                          • String ID:
                          • API String ID: 1853471036-0
                          • Opcode ID: 52ceedee8054c06ec14f59755b81bde08e3bc9b6535519cca4e62295fc732ca2
                          • Instruction ID: ed5be92d3bf6134cefe908e6fa7985f4dfc696be5701e0e52149d88051bd5ada
                          • Opcode Fuzzy Hash: 52ceedee8054c06ec14f59755b81bde08e3bc9b6535519cca4e62295fc732ca2
                          • Instruction Fuzzy Hash: E3715C72205B818AEB66CF27B8503EA37A4F78CBD4F154126EB5A57BB9DB34C841C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$DragFinishMessagewcsncpy
                          • String ID:
                          • API String ID: 1341528516-0
                          • Opcode ID: ccde60ca6dfcfaad7119bb9154ec1c9ec261f17a25e87d706210ee566780d9c2
                          • Instruction ID: 11a292f17cae053d3bb4a31b810780d30db17b8e74fc7f1a84688aa72f607595
                          • Opcode Fuzzy Hash: ccde60ca6dfcfaad7119bb9154ec1c9ec261f17a25e87d706210ee566780d9c2
                          • Instruction Fuzzy Hash: B0616C72605B818AEB66CF27B8503EA37A4F38CB94F144216EB5A57BB9DB34C841C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: D$Out of memory.
                          • API String ID: 3061335427-912868023
                          • Opcode ID: de3ecd7250df14a9912d781e738ce488222e06a12bd2100d6de471711654eb92
                          • Instruction ID: dc4dfe77ab9a0aafd71a3bf9ec27c246ef69ab2150d15aea4f9ba03619e03fe1
                          • Opcode Fuzzy Hash: de3ecd7250df14a9912d781e738ce488222e06a12bd2100d6de471711654eb92
                          • Instruction Fuzzy Hash: 93516A73615B81C6EB62DF16F8403E9B3A4F788B94F184026EF894BB68DB78C585C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$Color
                          • String ID:
                          • API String ID: 3922397608-0
                          • Opcode ID: 90ca506bcc4f3a7fc2fe7924679c0295cbdaa10ad3c3741bfd465a38438a5401
                          • Instruction ID: 9511c27309409c6a75130a34226e57c59c453d0376197965d87765e8dc615cf0
                          • Opcode Fuzzy Hash: 90ca506bcc4f3a7fc2fe7924679c0295cbdaa10ad3c3741bfd465a38438a5401
                          • Instruction Fuzzy Hash: 24318E3270058086FBB68B26D5507EA26A1E78CBE4F144221FB5987BF9DB76CCD1C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$LongMessageSendShowfree
                          • String ID:
                          • API String ID: 360501925-0
                          • Opcode ID: df77c8a6f11f8abdcc32d40378c5e44f0850ffde28e18d40162eef5cfa714032
                          • Instruction ID: 99d87c7c44bccbc87c51c33352257cd66e9be3b56edc44b9936c0c627ad3465d
                          • Opcode Fuzzy Hash: df77c8a6f11f8abdcc32d40378c5e44f0850ffde28e18d40162eef5cfa714032
                          • Instruction Fuzzy Hash: 5E21A376305A8082FB668B17A4507E97760B74DBE0F144216EB6A47AF5DF38CA804301
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Windowfree$LongTextmalloc
                          • String ID:
                          • API String ID: 1796630370-0
                          • Opcode ID: 37ec3d9c106aa2cdf60dfb5a669adc6f1827bdaf183792bdac432850b7c3f5a6
                          • Instruction ID: bcd6f01a33b12c44c436348fd04a0aa8f56ff1e8d3ff647d4178df68728b19a1
                          • Opcode Fuzzy Hash: 37ec3d9c106aa2cdf60dfb5a669adc6f1827bdaf183792bdac432850b7c3f5a6
                          • Instruction Fuzzy Hash: 53118236305A4481FA678B07A5587E9B361B74CBE4F184217EF6D07BB8DE39C6848342
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: IconNotifyShell_wcsncpy
                          • String ID: AutoHotkey
                          • API String ID: 1496823222-348589305
                          • Opcode ID: 1c13e32433b4dbcab05539a1e335728b0d00a7f961731df38ad5abdf0f83f276
                          • Instruction ID: f45756e29e37f5357d3ec4240e54fe5dcbb49a1cd24ecaae9431df1f5c2c8069
                          • Opcode Fuzzy Hash: 1c13e32433b4dbcab05539a1e335728b0d00a7f961731df38ad5abdf0f83f276
                          • Instruction Fuzzy Hash: 4B2189B2705B8096EB8DCF22E588799B3A0FB48BC0F045129EB6C07764DF38E5B18700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _wcstoi64$free
                          • String ID:
                          • API String ID: 3758122174-0
                          • Opcode ID: 83ed4ab6d35221f3a36cd29fa5621a544de8ff6d4bd299d401d93d335f500893
                          • Instruction ID: 61d6d902612efd036cf95982525fefd5b979ffd69aff21b30f7e265c2eb22347
                          • Opcode Fuzzy Hash: 83ed4ab6d35221f3a36cd29fa5621a544de8ff6d4bd299d401d93d335f500893
                          • Instruction Fuzzy Hash: 61718472B00BC49BDB668F26D8443D923A5F75CBD8F194615FB1A0BBA8CF30C9918B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 466a89b885fb7dc01b326c9ca6f4fd36821720f5dc77c8474f35951a5ea74041
                          • Instruction ID: 1f01e7386dcd9b68fd24de04cd51ba8b67b4d0d3828a6a8a85015bbbd3368586
                          • Opcode Fuzzy Hash: 466a89b885fb7dc01b326c9ca6f4fd36821720f5dc77c8474f35951a5ea74041
                          • Instruction Fuzzy Hash: 5D417E76604B409AF766CF66F9507EA37A0F78CB98F144125EB4A57BB9DB34C940CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 074f51e1821d502308eade9be960250f751afedbc5e338baa1fea5c620d99e9b
                          • Instruction ID: dc49e0cd019f42bb454fae8c3ca2c526d4422c93c115da75787e4ca7206fcc5e
                          • Opcode Fuzzy Hash: 074f51e1821d502308eade9be960250f751afedbc5e338baa1fea5c620d99e9b
                          • Instruction Fuzzy Hash: A0418176604B408AF766CF26F9507EA37A1F78CB98F544125EB4A57BB5DB34C940CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: aa5fac695990a120fea033053ec64ba67c67dc49d0e050e1adfa2ef367001cde
                          • Instruction ID: 306572cc3509cc9881cbe06e47fdd5a6db1c09047bb340335219477187699b61
                          • Opcode Fuzzy Hash: aa5fac695990a120fea033053ec64ba67c67dc49d0e050e1adfa2ef367001cde
                          • Instruction Fuzzy Hash: 4A418076600B408AF756CF26F9407EA37A1F78CB98F144125EB4953BB9DB34C841CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: a4f8c283964208c6129d9373264f433be993178d0cf0c3fb0b785a9d280ca3d0
                          • Instruction ID: 73d9fcc178c1e82285268a810563e63679751d21795bbebdb6eb4bace2170aae
                          • Opcode Fuzzy Hash: a4f8c283964208c6129d9373264f433be993178d0cf0c3fb0b785a9d280ca3d0
                          • Instruction Fuzzy Hash: EB418076600B808AF766CF26F9503EA37A1F78CB98F544125EB8957BB9DB34C941CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 7eb3b03ddc9aee745c04041c2ee8b54966eda4b7a15d59009d00df572f67028a
                          • Instruction ID: 80dbc5cb5cdcb491455f5d37854b988b18f0d1707e0d37f0f9d49cf77663e3ac
                          • Opcode Fuzzy Hash: 7eb3b03ddc9aee745c04041c2ee8b54966eda4b7a15d59009d00df572f67028a
                          • Instruction Fuzzy Hash: DA316D76604B409AFB66CF66F9407EA37A1F78CB98F544125EB4A53BB9DB34C940CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 46d018799f9bcbbcff5d916369d3647abc9537d4702bf12ff400b0f8b0456519
                          • Instruction ID: 52eebd9ad252fdc6ead665b79d920147c72bcd16c2b28917430767302eb8f934
                          • Opcode Fuzzy Hash: 46d018799f9bcbbcff5d916369d3647abc9537d4702bf12ff400b0f8b0456519
                          • Instruction Fuzzy Hash: 8E316D76600B408AFB56CF26F9407EA37A1F78CB98F544125EB4A53BB9DB38C841CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 39e0d42d080ff4e88cb32799c911c3be92e1f068ab47256a9a92ecf6daff2462
                          • Instruction ID: 706b5c8f317d37098381b89ebf3f9d916a3965cb6985a18ffb2b24165983eb3b
                          • Opcode Fuzzy Hash: 39e0d42d080ff4e88cb32799c911c3be92e1f068ab47256a9a92ecf6daff2462
                          • Instruction Fuzzy Hash: 1E317276600B408AF756CF66F9507EA37A1F78CB98F544125EB4A53BB5DB34C940CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$FocusMessage
                          • String ID:
                          • API String ID: 3376117608-0
                          • Opcode ID: 82401cbc1cf92276fee1884eb51a8f5e493ed4d274fdd35200cf25213dd51500
                          • Instruction ID: 5e6fd0fc5be87267a6b4cdd7c42e24c45943ed98eb6c3ebc17cbf919b801910e
                          • Opcode Fuzzy Hash: 82401cbc1cf92276fee1884eb51a8f5e493ed4d274fdd35200cf25213dd51500
                          • Instruction Fuzzy Hash: 22316F76600B409AFB56CF26F9507EA37A1F78CB98F544125EB4A53BB9DB34C941CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Message$ClientScreenSend
                          • String ID:
                          • API String ID: 1901011154-0
                          • Opcode ID: d68c2f87afe48bd490fab394267ced51e01ed07e776772dce287ea53fc359214
                          • Instruction ID: 191f61315000e7a1a2cffe6910b3583379a0a46be4de3a5fe7f23f32866746b5
                          • Opcode Fuzzy Hash: d68c2f87afe48bd490fab394267ced51e01ed07e776772dce287ea53fc359214
                          • Instruction Fuzzy Hash: E821FD73F2869087EB728766A414BDE6691F7897E4F548211FB5643AF5CB34C9428B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend$InvalidateRect
                          • String ID:
                          • API String ID: 2778011698-0
                          • Opcode ID: a26b4fc6c66be2a1493ffa95630a7542902f476ec6ae8625b4431646e8fa7b21
                          • Instruction ID: 2775a8b4835cd107eeb150bad191fddae658e89ed72cf8fbaf17216042dfa404
                          • Opcode Fuzzy Hash: a26b4fc6c66be2a1493ffa95630a7542902f476ec6ae8625b4431646e8fa7b21
                          • Instruction Fuzzy Hash: 1611E173B04A8081E7B2D727E519BEA63A0E789BE4F168011EF4C53AA5DF34C8C18B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: System$ClassInfoParametersRegister$CursorLoadMetricsmalloc
                          • String ID:
                          • API String ID: 2336117585-0
                          • Opcode ID: 4e21fa9c11c5ef06e504cecd8883474a7ebcdfdc9a03fe77685f91768f130b29
                          • Instruction ID: aa6dd1fc03d2a4c48dc0af4e102b70f09245cbb967c09fcaf673b4fba339693a
                          • Opcode Fuzzy Hash: 4e21fa9c11c5ef06e504cecd8883474a7ebcdfdc9a03fe77685f91768f130b29
                          • Instruction Fuzzy Hash: D7015E70B0474081FB5AEB57B8957D66291ABCDB85F8C8039AF4C5B6F1EE3CC5858710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessagePostProcShowWindow
                          • String ID:
                          • API String ID: 1210555256-0
                          • Opcode ID: 818ea42634378aeebb5c931e01a6fbae02635338b86e1ae330fe2daf2e777947
                          • Instruction ID: defd89c1b72357b92bd52bd6f255b72cdbaaa8d96bc8b56f9197118a5d43e26d
                          • Opcode Fuzzy Hash: 818ea42634378aeebb5c931e01a6fbae02635338b86e1ae330fe2daf2e777947
                          • Instruction Fuzzy Hash: DA018676A2558485FB62C753A5207D61691FF8DBE8F488421AF0B17BB5CF38C9858300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ClipFillProcRect
                          • String ID:
                          • API String ID: 3467838497-0
                          • Opcode ID: 29c696640484a8b36daca3dfdf511d4fbf3af72c06a65b3203daefdbea1b62fe
                          • Instruction ID: 617a9d58b73bbd730b2f9f34bb7e6efec7f0d2b9afd0249a32774d2406807bfd
                          • Opcode Fuzzy Hash: 29c696640484a8b36daca3dfdf511d4fbf3af72c06a65b3203daefdbea1b62fe
                          • Instruction Fuzzy Hash: 0DF06276A05BC185EB22CB13A4143D96360FB4DBE8F884022AF0E2B769CF38C9C5C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: ac04c6d3f762f3c0e781f1327f99d072d79d498e749f5e6fae7e75d4e64e9a49
                          • Instruction ID: 112b7cf698f3fa1c989c3a79d0411f742e7227c85ae3724e0e85bb59d38e0f4f
                          • Opcode Fuzzy Hash: ac04c6d3f762f3c0e781f1327f99d072d79d498e749f5e6fae7e75d4e64e9a49
                          • Instruction Fuzzy Hash: 72519D73218BC086D722CFAAD44639C7BB4F35DB88F590106EB89177AACB34C992C344
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Info
                          • String ID:
                          • API String ID: 1807457897-0
                          • Opcode ID: 1a90680036c19e922d6c52027731fdc606d85e7d379e83badf0b7055807d3c2c
                          • Instruction ID: e81c79421bb14a7be2457c43d923f3a937507750e9e2d4301a6a03fade4ed29e
                          • Opcode Fuzzy Hash: 1a90680036c19e922d6c52027731fdc606d85e7d379e83badf0b7055807d3c2c
                          • Instruction Fuzzy Hash: 82415D72604B4086FB668F26E45439977A1E7AEBE4F488215EB45077E8CB3DC881CB41
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSendfree
                          • String ID:
                          • API String ID: 958794898-0
                          • Opcode ID: 6ab4f3233cc45f056f464694495200887d3d64d2f14e2f1911ec75b7033182ac
                          • Instruction ID: 5f18245ccb877639946ac730388a6a54510f5bea3e0dfa6607e7e70a8aafcd68
                          • Opcode Fuzzy Hash: 6ab4f3233cc45f056f464694495200887d3d64d2f14e2f1911ec75b7033182ac
                          • Instruction Fuzzy Hash: 3B214836B057508AF722CF62A8507DE7760F74C7A8F14421AEF6C1BBA8DB38C5818B41
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Message$Post$SendTimeout$ProcWindow
                          • String ID:
                          • API String ID: 2617672042-0
                          • Opcode ID: 452e0cbbef118e0098b41bc898a5ecd7b5c503e8964b8024d1a303133481c515
                          • Instruction ID: dbf8fa8167f1aa047b5a89bb4eea0efaf6aafdde3deddb13f6630b496da13ff6
                          • Opcode Fuzzy Hash: 452e0cbbef118e0098b41bc898a5ecd7b5c503e8964b8024d1a303133481c515
                          • Instruction Fuzzy Hash: AA11A03131028085EFB6CB3794047EA2391E74CBD8F584912EF09277B0CE3AC842C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 83e526a647e7bdab881f26c69b1ccb3f8e1df2c9df3fe1d5e8e91b5fe4000bd1
                          • Instruction ID: 4b5643b067eb5ddc76b1c1676cd91357340bafa47c80415a17788ec96b855fac
                          • Opcode Fuzzy Hash: 83e526a647e7bdab881f26c69b1ccb3f8e1df2c9df3fe1d5e8e91b5fe4000bd1
                          • Instruction Fuzzy Hash: F511E7326086C442E3728B2BA5507AA2751EB8ABF4F144311FF6947BF9C738CC818704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 547a42b12677bcbf03d164ce558bba0ca3b9eb586e52cdadde8fe009b2efedda
                          • Instruction ID: 136a0309ad0ae291fba7c65a1ab2836b68317d3d4a6afba1fdbc6ff19878d080
                          • Opcode Fuzzy Hash: 547a42b12677bcbf03d164ce558bba0ca3b9eb586e52cdadde8fe009b2efedda
                          • Instruction Fuzzy Hash: 4C110272B196D443E762CB56A540B9A7795FB8DBE4F488101FF4903BE8CB38CC828700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Parameter #2 invalid.
                          • API String ID: 1294909896-2738454155
                          • Opcode ID: 97127b4797f153d18e4ae5ba402b0393459642c7522f2651d41872f0533c3450
                          • Instruction ID: 4ab7cef113e5ebd2e1a0f79f29a2dabf7aae22593bd6c262164e901860504729
                          • Opcode Fuzzy Hash: 97127b4797f153d18e4ae5ba402b0393459642c7522f2651d41872f0533c3450
                          • Instruction Fuzzy Hash: BC118C36215B5481EA16DF13B881BDA6374F74CBE0F480036BF6A17772EB38C94A8340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$Rect$InvalidatePointsTextfree
                          • String ID:
                          • API String ID: 1567079065-0
                          • Opcode ID: 23a90e2d219ba410a4a5c9dc0a17ebdcd933ef5d885b8e9c41e486849a142374
                          • Instruction ID: aeff0c285cc67c0df3a1c95a838a0296c41ef354f958bd68eed168f9e3278dd9
                          • Opcode Fuzzy Hash: 23a90e2d219ba410a4a5c9dc0a17ebdcd933ef5d885b8e9c41e486849a142374
                          • Instruction Fuzzy Hash: 9D014B36704A4481F667CB07A9447EABB71B74CBD5F480217EF6D1B6B0EA39C6848301
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Focusfree
                          • String ID:
                          • API String ID: 1910739701-0
                          • Opcode ID: 2eb6a4fb697b4a6a3a41afe346e74c6ea942d6f32c8dd9d0a8d053fd0bcbf49e
                          • Instruction ID: 979023453ddc6c1e03338be4e980e29f502b6bf45968d771c12321f91b500cee
                          • Opcode Fuzzy Hash: 2eb6a4fb697b4a6a3a41afe346e74c6ea942d6f32c8dd9d0a8d053fd0bcbf49e
                          • Instruction Fuzzy Hash: 7001FB36701A5485E6678B13E8807D97364B74CBE4F480227EF6D57774EE39C6848241
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CtrlProc
                          • String ID:
                          • API String ID: 1788423375-0
                          • Opcode ID: 4dfa51fcbf296e98bffe5018ad73ab307baeaae382691d18f8ece53e18a68a8a
                          • Instruction ID: a40bc3fa6958ffdb43d622db8d0a8fa7a538f94d8f92a75da51d596b3579a9ae
                          • Opcode Fuzzy Hash: 4dfa51fcbf296e98bffe5018ad73ab307baeaae382691d18f8ece53e18a68a8a
                          • Instruction Fuzzy Hash: E4F0B43671A6D081E672CB1379207DA6390FB8DBD4F484422AF4A13B69CF3CC586C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: FocusProcWindow
                          • String ID:
                          • API String ID: 1691694861-0
                          • Opcode ID: 7f6fdec764571e86f1907e6865b635a467b3a95f3365bcbffd90c40c78c863ad
                          • Instruction ID: 43be29760b6003af43ff3aabb428fde74b4e2e7218dfc3684602e9a5ca2171b3
                          • Opcode Fuzzy Hash: 7f6fdec764571e86f1907e6865b635a467b3a95f3365bcbffd90c40c78c863ad
                          • Instruction Fuzzy Hash: 8CF0E536220A84C9D6A6CB53A8083DA7325F78DFE8F984452DF4967778CE39C886C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick
                          • String ID:
                          • API String ID: 536389180-0
                          • Opcode ID: ba06a9ccee9a85427bd696e607489bb3eef48723d7071003278b07d8de49ee1c
                          • Instruction ID: ad340e0524b26f80b08cd94f68690f844b5c09aac5af3b816bd6fcea8bdcb853
                          • Opcode Fuzzy Hash: ba06a9ccee9a85427bd696e607489bb3eef48723d7071003278b07d8de49ee1c
                          • Instruction Fuzzy Hash: 7F3181B2A0468482FB56CB37F4447DA77A2E74CBD8F088025EB4C677A5DB78C4918B00
                          APIs
                          • SetErrorMode.KERNEL32 ref: 0000000140005310
                            • Part of subcall function 0000000140063E20: GetCurrentDirectoryW.KERNEL32(?,000000014000531D), ref: 0000000140063E3C
                            • Part of subcall function 0000000140005660: FindWindowW.USER32 ref: 00000001400056EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CurrentDirectoryErrorFindModeWindow
                          • String ID:
                          • API String ID: 2401824476-0
                          • Opcode ID: 305600de10a4d5096b095257050746d74fa15adb4c427a8982c5a6bfec7bddc1
                          • Instruction ID: a767f65e330600fcd84777f9cc0cdf34d132e03d461d7ff85166b88e96f2a39c
                          • Opcode Fuzzy Hash: 305600de10a4d5096b095257050746d74fa15adb4c427a8982c5a6bfec7bddc1
                          • Instruction Fuzzy Hash: 4C3191B1A1160481FB5BFB23B8553EB22D1AB4E7E1F800525B72A8B2F1EE7CC5848310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Object
                          • String ID:
                          • API String ID: 2936123098-0
                          • Opcode ID: 8d2e59c2583661f538acd2027fbd43174670fdef9400d65fc7c1ddbe17c5b569
                          • Instruction ID: f0d33929111da59fd1381810d07366ec9527e2264bd26042f2471d17273987ff
                          • Opcode Fuzzy Hash: 8d2e59c2583661f538acd2027fbd43174670fdef9400d65fc7c1ddbe17c5b569
                          • Instruction Fuzzy Hash: 0A214B33215B4586EB268F27E42039977A0FB8CBC4F594116EB49077A4EF78CA50C780
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Proc
                          • String ID:
                          • API String ID: 2346855178-0
                          • Opcode ID: e64e28c23966b232dcbf818eff2d70b1959a2a686e24e1bc5aa893b05ef47389
                          • Instruction ID: b7758fe3d84675bab67651c86ade9560d669d2f48a6c5f63d8a297aa2a9266c3
                          • Opcode Fuzzy Hash: e64e28c23966b232dcbf818eff2d70b1959a2a686e24e1bc5aa893b05ef47389
                          • Instruction Fuzzy Hash: 7D11C473E28A508BE6728616A400FD92681E34D7F4F645322BF7A83BF4D774CD828B40
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3244b45a8350a4d3fb87ff4e3ce446de24604748f0076ae77516935802419f4c
                          • Instruction ID: db6641b71a8bcdcb63be9b90cc27faec62991d6dd4a5fd8c5a8e41dde82957d1
                          • Opcode Fuzzy Hash: 3244b45a8350a4d3fb87ff4e3ce446de24604748f0076ae77516935802419f4c
                          • Instruction Fuzzy Hash: 8001F573A6518087E2268716A454BE82750F74D7E4F184622EF16937E5CB38CC868700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 291e36392938e96f1baec8ae3c128f8b5933aad30fede219adc547c7b39abe65
                          • Instruction ID: 7db6263f8d549ae9e3785c539edbb3bd57d376ec89d810e8eb6cce722f452992
                          • Opcode Fuzzy Hash: 291e36392938e96f1baec8ae3c128f8b5933aad30fede219adc547c7b39abe65
                          • Instruction Fuzzy Hash: F70184726096C082E2228A1AB550B9A6791EB8DBF4F140311BEA943BE9C738C8818704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 3c0afa106f1edf3422327cc00ff5fda769f4e1bda9d0a0f202ee372d83c63923
                          • Instruction ID: 8f2d6129143372368c4c6c46c53a980027e15eb30bf26277f786813baa97dc46
                          • Opcode Fuzzy Hash: 3c0afa106f1edf3422327cc00ff5fda769f4e1bda9d0a0f202ee372d83c63923
                          • Instruction Fuzzy Hash: B401A772A096C086E232CB5AB55079A6751EB8DBF4F140315BF7943BE9C738C8828704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageProcSend
                          • String ID:
                          • API String ID: 650375871-0
                          • Opcode ID: 928b74e414f712d69828ad45ec7e940dcf04883f28eb8c07ad8372ac2d06dab5
                          • Instruction ID: 077f8c2a95a45f4f09bae69f669ac719c524d62e7a7ba2ae9c86cb4b572acbaa
                          • Opcode Fuzzy Hash: 928b74e414f712d69828ad45ec7e940dcf04883f28eb8c07ad8372ac2d06dab5
                          • Instruction Fuzzy Hash: 3EF0A472A1968083E6328B16A510BDA6361FB8EBF4F144711FF7903BE5C738D8868704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: MessageProcSend
                          • String ID:
                          • API String ID: 650375871-0
                          • Opcode ID: a6b605ec8c4bd7de16276d8d9c7cea35703b3bccfc5d67cd45990161bd609d60
                          • Instruction ID: 6cf27a7dc4d297a5b90a60fed68829d737dc16cda7d2134d5ef07550e7c893df
                          • Opcode Fuzzy Hash: a6b605ec8c4bd7de16276d8d9c7cea35703b3bccfc5d67cd45990161bd609d60
                          • Instruction Fuzzy Hash: 51F0C872A0968083E7318B16A5107D97361F74EBF4F140311FE7903BE5C738D8828704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Proc
                          • String ID:
                          • API String ID: 2346855178-0
                          • Opcode ID: 5f50249f5da00ddc88e49ff261320190874b51d42f7ceeccd83c31ec446354fb
                          • Instruction ID: 4eee9e471f0baee94eb8db92681dd1e38b8f4c1589a32b8f8c1b68fd65a23cfb
                          • Opcode Fuzzy Hash: 5f50249f5da00ddc88e49ff261320190874b51d42f7ceeccd83c31ec446354fb
                          • Instruction Fuzzy Hash: D8F05E72E562C185FA7387236920BD51794BF4EBD4F488021BF0B177A5CB38DAC28700
                          APIs
                          • K32GetProcessMemoryInfo.KERNEL32(?,00000000,?,000000014006B6B4), ref: 00000001400CA5DF
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: InfoMemoryProcess
                          • String ID:
                          • API String ID: 506147045-0
                          • Opcode ID: 3604070ed817b1c79ecce3099310e17d74fbca22ec9a962f649aff4916e46ff2
                          • Instruction ID: 622a6dab3f9edd7bf820a89d6d24edad818d9d6b2ec866214b3bf7f4f748d09a
                          • Opcode Fuzzy Hash: 3604070ed817b1c79ecce3099310e17d74fbca22ec9a962f649aff4916e46ff2
                          • Instruction Fuzzy Hash: A0E06566B1099891DB01A67B980268827345B68FD4F14C133AD0C27B04DA20D1564600
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Message$PostSendTimeout$ProcWindow
                          • String ID:
                          • API String ID: 2241355032-0
                          • Opcode ID: 52b3c87fc0582bffd949f044ad4d3b2e21c1a90051e58b688e997ea240a15d43
                          • Instruction ID: e8bd0f09ae92e8976c601995abb46682831f5666f2fb82043f7a4eea84b7b487
                          • Opcode Fuzzy Hash: 52b3c87fc0582bffd949f044ad4d3b2e21c1a90051e58b688e997ea240a15d43
                          • Instruction Fuzzy Hash: 19F08C3160468089EABBDB23A9047EA6354F75DBE4F880552EF49177B8CE39C882C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Message$PostSendTimeout$ProcWindow
                          • String ID:
                          • API String ID: 2241355032-0
                          • Opcode ID: 73769f3404a28d8316fd93cc677cfca1075c57be5523aa1eb7f863a1f34821c0
                          • Instruction ID: 51854d67a934218697dbb0bed4505ae7712fb3b0623df01f16fe71c5103f5623
                          • Opcode Fuzzy Hash: 73769f3404a28d8316fd93cc677cfca1075c57be5523aa1eb7f863a1f34821c0
                          • Instruction Fuzzy Hash: 0FF0E231220A8094EBA2DB33A8083E63311F74CBF4F880202EF59537B4CE35C482C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Message$PostSendTimeout$DrawIconProcWindow
                          • String ID:
                          • API String ID: 2027319081-0
                          • Opcode ID: 08578b2a9eee807a6cd43f69dd54896c4b6916bfde4dd0ba2f78ade3ed896f34
                          • Instruction ID: 1af1e95ca84cacf10ff083a3b160eb6954cdc5e7fa65472f6dec53d82aed3348
                          • Opcode Fuzzy Hash: 08578b2a9eee807a6cd43f69dd54896c4b6916bfde4dd0ba2f78ade3ed896f34
                          • Instruction Fuzzy Hash: 4AF0A03170468089EABBDB23A9047E66354F75CFE4F880552EF48177B8DE39C882C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$DeleteDestroyMessageObjectSend$DragFinishIconMenuProcShow
                          • String ID:
                          • API String ID: 4213792195-0
                          • Opcode ID: e3982259b4fee8621d61f82f03e738b882cf23939517f0458007c3be3fc78cb8
                          • Instruction ID: f94310a22d693bcaf01f5ef58c108095004cda4c55d1a289b37ae5ed56efd000
                          • Opcode Fuzzy Hash: e3982259b4fee8621d61f82f03e738b882cf23939517f0458007c3be3fc78cb8
                          • Instruction Fuzzy Hash: 96F012769092C084E763C72365107E62694FB8DBD8F488066AF4E137A6CF38D6D68711
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Proc
                          • String ID:
                          • API String ID: 2346855178-0
                          • Opcode ID: a46d20b856bd5ec95d00d0aae70928f40fdca3ab14048f3d5c3dbe686b2584c5
                          • Instruction ID: 9e88c12f1f133c8a410a4c4c3e590a333b83430e9ac6ca52cdd6e1210b939d12
                          • Opcode Fuzzy Hash: a46d20b856bd5ec95d00d0aae70928f40fdca3ab14048f3d5c3dbe686b2584c5
                          • Instruction Fuzzy Hash: 97E06D76A1A2C185E773872365107D66794BB4DBE4F4C4422AF4A237A5DB38CAC68700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ProcShowWindow
                          • String ID:
                          • API String ID: 402548696-0
                          • Opcode ID: 9a8612c804572db91fef7ff0e4e17f2d06f63004fd8b96752043f6d0ad460b5a
                          • Instruction ID: b36a764a0e3646cec85d5d5d80002bdc70efc6449763c1dd7643250a5e746f05
                          • Opcode Fuzzy Hash: 9a8612c804572db91fef7ff0e4e17f2d06f63004fd8b96752043f6d0ad460b5a
                          • Instruction Fuzzy Hash: DEE09232A162C185EA73C71375207D61350BF4EBE4F8844226F0E23765CF38D6828700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ProcWindow
                          • String ID:
                          • API String ID: 181713994-0
                          • Opcode ID: a1a2dc6b5c5f2252d2a6f71790d7efdfbdae763811175e89f4c7e69d753ad5bf
                          • Instruction ID: 09ac8345ab926d3f659aa5b10624fa1af9c94c2182bb39313a7b5bdfb659d8d7
                          • Opcode Fuzzy Hash: a1a2dc6b5c5f2252d2a6f71790d7efdfbdae763811175e89f4c7e69d753ad5bf
                          • Instruction Fuzzy Hash: 10F0A936220A84D5D6A2DB12E4087DA2321F78CBE8F844412DF4813738CE34C88ACB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountMessagePostTick
                          • String ID:
                          • API String ID: 1233319983-0
                          • Opcode ID: 559b25f915f190700bafda9ec81ed6373ac053419a0defaa4b3700ea00f2d7c2
                          • Instruction ID: dbf9eac6577d8fa7336361ee20d3d890234e70cc5ed3963604f3a4ff82f5720a
                          • Opcode Fuzzy Hash: 559b25f915f190700bafda9ec81ed6373ac053419a0defaa4b3700ea00f2d7c2
                          • Instruction Fuzzy Hash: 00E08636314AC1C4D7A2CB63A4043DA5315F74CFD4F984052EF8963765DE35D846C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockfree
                          • String ID:
                          • API String ID: 3390695210-0
                          • Opcode ID: b01210c6ade723cbb11f5d2d5e6fef7cdccfeb0940d0e1fa5df757c44d6b52c8
                          • Instruction ID: 7751201ea46727527484b8cd2f5e54a4d79b80012515c905aa0132f651241c00
                          • Opcode Fuzzy Hash: b01210c6ade723cbb11f5d2d5e6fef7cdccfeb0940d0e1fa5df757c44d6b52c8
                          • Instruction Fuzzy Hash: B2F01937201A8485EFA3DE66A8113EA2391F3887D8F594813AF5D877A5DE30C5868740
                          APIs
                          • malloc.LIBCMT ref: 00000001400AA8FB
                            • Part of subcall function 00000001400CA9C4: _FF_MSGBANNER.LIBCMT ref: 00000001400CA9F4
                            • Part of subcall function 00000001400CA9C4: HeapAlloc.KERNEL32(?,?,00000000,00000001400D0AC0,?,?,00000000,00000001400CF2FD,?,?,?,00000001400CF3A7,?,?,00000000,00000001400CE795), ref: 00000001400CAA19
                            • Part of subcall function 00000001400CA9C4: _callnewh.LIBCMT ref: 00000001400CAA32
                            • Part of subcall function 00000001400CA9C4: _errno.LIBCMT ref: 00000001400CAA3D
                            • Part of subcall function 00000001400CA9C4: _errno.LIBCMT ref: 00000001400CAA48
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno$AllocHeap_callnewhmalloc
                          • String ID:
                          • API String ID: 908589684-0
                          • Opcode ID: fcfc9a1df6e0bc85991b3739faf1ac6917ddc8aaf1b220a586ab12618ba77058
                          • Instruction ID: c81b00bb37ac1c51701ff997527113ff163bba93f9151a614237ab336f08699d
                          • Opcode Fuzzy Hash: fcfc9a1df6e0bc85991b3739faf1ac6917ddc8aaf1b220a586ab12618ba77058
                          • Instruction Fuzzy Hash: 70F0813270464086EF95CF2AE08436D23A1E79CB98F195125EB4D47399DB38C8C1CB00
                          APIs
                          • free.LIBCMT ref: 000000014008CBA1
                            • Part of subcall function 00000001400CB13C: RtlFreeHeap.NTDLL(?,?,00000000,00000001400CE860,?,?,00000000,00000001400CE883,?,?,?,00000001400CA7AB,?,?,00000000,00000001400CFD3B), ref: 00000001400CB152
                            • Part of subcall function 00000001400CB13C: _errno.LIBCMT ref: 00000001400CB15C
                            • Part of subcall function 00000001400CB13C: GetLastError.KERNEL32(?,?,00000000,00000001400CE860,?,?,00000000,00000001400CE883,?,?,?,00000001400CA7AB,?,?,00000000,00000001400CFD3B), ref: 00000001400CB164
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorFreeHeapLast_errnofree
                          • String ID:
                          • API String ID: 3856698052-0
                          • Opcode ID: 5c43d8c39bc6afca2c93b326f3bee02123c9fa37f7e60a7aa09e7e105c938470
                          • Instruction ID: f580b80ba21d471bbf1a98d566247b7f8980da8590e8442469877913a2edf44e
                          • Opcode Fuzzy Hash: 5c43d8c39bc6afca2c93b326f3bee02123c9fa37f7e60a7aa09e7e105c938470
                          • Instruction Fuzzy Hash: 41F04936711B0481EA47CB03B881BD663B4F34CBE0F4C0426AF2907771EB38C9868340
                          APIs
                          • malloc.LIBCMT ref: 00000001400AA4D5
                            • Part of subcall function 00000001400CA9C4: _FF_MSGBANNER.LIBCMT ref: 00000001400CA9F4
                            • Part of subcall function 00000001400CA9C4: HeapAlloc.KERNEL32(?,?,00000000,00000001400D0AC0,?,?,00000000,00000001400CF2FD,?,?,?,00000001400CF3A7,?,?,00000000,00000001400CE795), ref: 00000001400CAA19
                            • Part of subcall function 00000001400CA9C4: _callnewh.LIBCMT ref: 00000001400CAA32
                            • Part of subcall function 00000001400CA9C4: _errno.LIBCMT ref: 00000001400CAA3D
                            • Part of subcall function 00000001400CA9C4: _errno.LIBCMT ref: 00000001400CAA48
                          Memory Dump Source
                          • Source File: 00000000.00000002.3071627812.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.3071608721.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071704252.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071755188.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071775112.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071795521.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3071813768.000000014015E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errnomalloc$AllocHeap_callnewh
                          • String ID:
                          • API String ID: 3069281513-0
                          • Opcode ID: d6d3a239a739e2c4e1d10317744ef1ba837495e7934902cfc54e85bbec758f99
                          • Instruction ID: cc2869e1643afeacdc4934b6a57c6d6c748a122b421dba749d8fb7c5255d004d
                          • Opcode Fuzzy Hash: d6d3a239a739e2c4e1d10317744ef1ba837495e7934902cfc54e85bbec758f99
                          • Instruction Fuzzy Hash: D3F01531642B0481EB5F9B67A4653A822D0EB9DB84F081528BF890B3E2EF7C84E18750