Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z25RFQ945894-PDF.exe

Overview

General Information

Sample name:z25RFQ945894-PDF.exe
Analysis ID:1522581
MD5:6cfb2ab5bfb52347d141ab2a82ab9ab2
SHA1:cdc4e03046d770a589e09ec9e9ba56f16afce2f5
SHA256:97aed74a1556b5b96eacd10c8ba1e206036d8f6fc35fab882689566c8c16aa6b
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z25RFQ945894-PDF.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\z25RFQ945894-PDF.exe" MD5: 6CFB2AB5BFB52347D141AB2A82AB9AB2)
    • RegSvcs.exe (PID: 7448 cmdline: "C:\Users\user\Desktop\z25RFQ945894-PDF.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.zqamcx.com", "Username": "kingship@zqamcx.com", "Password": "Methodman991"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.2894103472.0000000003308000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.z25RFQ945894-PDF.exe.1160000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.z25RFQ945894-PDF.exe.1160000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.z25RFQ945894-PDF.exe.1160000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x315b5:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31627:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x316b1:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31743:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x317ad:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3181f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x318b5:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31945:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 78.110.166.82, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7448, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.zqamcx.com", "Username": "kingship@zqamcx.com", "Password": "Methodman991"}
                    Source: zqamcx.comVirustotal: Detection: 9%Perma Link
                    Source: mail.zqamcx.comVirustotal: Detection: 9%Perma Link
                    Source: http://zqamcx.comVirustotal: Detection: 9%Perma Link
                    Source: http://mail.zqamcx.comVirustotal: Detection: 9%Perma Link
                    Source: z25RFQ945894-PDF.exeReversingLabs: Detection: 18%
                    Source: z25RFQ945894-PDF.exeVirustotal: Detection: 16%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: z25RFQ945894-PDF.exeJoe Sandbox ML: detected
                    Source: z25RFQ945894-PDF.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: z25RFQ945894-PDF.exe, 00000000.00000003.1659802907.0000000003C70000.00000004.00001000.00020000.00000000.sdmp, z25RFQ945894-PDF.exe, 00000000.00000003.1660041474.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: z25RFQ945894-PDF.exe, 00000000.00000003.1659802907.0000000003C70000.00000004.00001000.00020000.00000000.sdmp, z25RFQ945894-PDF.exe, 00000000.00000003.1660041474.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_0028449B
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028C75D FindFirstFileW,FindClose,0_2_0028C75D
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0028C7E8
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0028F021
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0028F17E
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0028F47F
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00283833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00283833
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00283B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00283B56
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0028BD48
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 78.110.166.82:587
                    Source: Joe Sandbox ViewIP Address: 78.110.166.82 78.110.166.82
                    Source: Joe Sandbox ViewASN Name: UKSERVERS-ASUKDedicatedServersHostingandCo-Location UKSERVERS-ASUKDedicatedServersHostingandCo-Location
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 78.110.166.82:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00292404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00292404
                    Source: global trafficDNS traffic detected: DNS query: mail.zqamcx.com
                    Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.zqamcx.com
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0#
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://zqamcx.com
                    Source: z25RFQ945894-PDF.exe, 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, aXzTh9Yxb3.cs.Net Code: lwNQNyMpCNT
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0029407C
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0029427A
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0029407C
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0028003A
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002ACB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_002ACB26

                    System Summary

                    barindex
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: This is a third-party compiled AutoIt script.0_2_00223B4C
                    Source: z25RFQ945894-PDF.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: z25RFQ945894-PDF.exe, 00000000.00000000.1649028235.00000000002D4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_329ecbec-7
                    Source: z25RFQ945894-PDF.exe, 00000000.00000000.1649028235.00000000002D4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_2e1c2cfb-0
                    Source: z25RFQ945894-PDF.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6ae2466a-f
                    Source: z25RFQ945894-PDF.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_85e6a7c8-5
                    Source: initial sampleStatic PE information: Filename: z25RFQ945894-PDF.exe
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028A279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0028A279
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00278638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00278638
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00285264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00285264
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0022E8000_2_0022E800
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024DAF50_2_0024DAF5
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0022FE400_2_0022FE40
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0022E0600_2_0022E060
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002341400_2_00234140
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002423450_2_00242345
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002A04650_2_002A0465
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002564520_2_00256452
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002525AE0_2_002525AE
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024277A0_2_0024277A
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002368410_2_00236841
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002A08E20_2_002A08E2
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0027E9280_2_0027E928
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002889320_2_00288932
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0025890F0_2_0025890F
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002389680_2_00238968
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002569C40_2_002569C4
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024CCA10_2_0024CCA1
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00256F360_2_00256F36
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002370FE0_2_002370FE
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002331900_2_00233190
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002212870_2_00221287
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002433070_2_00243307
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024F3590_2_0024F359
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002416040_2_00241604
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002356800_2_00235680
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002478130_2_00247813
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002358C00_2_002358C0
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00241AF80_2_00241AF8
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00259C350_2_00259C35
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002A7E0D0_2_002A7E0D
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024BF260_2_0024BF26
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00241F100_2_00241F10
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0123FEC00_2_0123FEC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F93601_2_018F9360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F9B181_2_018F9B18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F4A881_2_018F4A88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018FCE681_2_018FCE68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F3E701_2_018F3E70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F41B81_2_018F41B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D7DD901_2_05D7DD90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D78C181_2_05D78C18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D79B681_2_05D79B68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D7BD881_2_05D7BD88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D757501_2_05D75750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D73F301_2_05D73F30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D749D81_2_05D749D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D750581_2_05D75058
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D700401_2_05D70040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D72B081_2_05D72B08
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05D732301_2_05D73230
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: String function: 00227F41 appears 35 times
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: String function: 00248A80 appears 42 times
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: String function: 00240C63 appears 70 times
                    Source: z25RFQ945894-PDF.exe, 00000000.00000003.1660588784.0000000003BF3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z25RFQ945894-PDF.exe
                    Source: z25RFQ945894-PDF.exe, 00000000.00000003.1660149230.0000000003D9D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z25RFQ945894-PDF.exe
                    Source: z25RFQ945894-PDF.exe, 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed50456b9-4259-4a06-b7ec-7664f0d171dc.exe4 vs z25RFQ945894-PDF.exe
                    Source: z25RFQ945894-PDF.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, oH693OIIGFg.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, 1jwN8Qsp0hs.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, BOM.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, SN5.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, cpjKUanB.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, IicScPhBvUG.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, dyn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/1
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028A0F4 GetLastError,FormatMessageW,0_2_0028A0F4
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002784F3 AdjustTokenPrivileges,CloseHandle,0_2_002784F3
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00278AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00278AA3
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028B3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0028B3BF
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029EF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0029EF21
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028C423 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0028C423
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00224FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00224FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeFile created: C:\Users\user\AppData\Local\Temp\autA113.tmpJump to behavior
                    Source: z25RFQ945894-PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: z25RFQ945894-PDF.exeReversingLabs: Detection: 18%
                    Source: z25RFQ945894-PDF.exeVirustotal: Detection: 16%
                    Source: unknownProcess created: C:\Users\user\Desktop\z25RFQ945894-PDF.exe "C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z25RFQ945894-PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: z25RFQ945894-PDF.exeStatic file information: File size 1049600 > 1048576
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: z25RFQ945894-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: z25RFQ945894-PDF.exe, 00000000.00000003.1659802907.0000000003C70000.00000004.00001000.00020000.00000000.sdmp, z25RFQ945894-PDF.exe, 00000000.00000003.1660041474.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: z25RFQ945894-PDF.exe, 00000000.00000003.1659802907.0000000003C70000.00000004.00001000.00020000.00000000.sdmp, z25RFQ945894-PDF.exe, 00000000.00000003.1660041474.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp
                    Source: z25RFQ945894-PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: z25RFQ945894-PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: z25RFQ945894-PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: z25RFQ945894-PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: z25RFQ945894-PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029C104 LoadLibraryA,GetProcAddress,0_2_0029C104
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00288538 push FFFFFF8Bh; iretd 0_2_0028853A
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0022C590 push eax; retn 0022h0_2_0022C599
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024E88F push edi; ret 0_2_0024E891
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024E9A8 push esi; ret 0_2_0024E9AA
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00248AC5 push ecx; ret 0_2_00248AD8
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024EB83 push esi; ret 0_2_0024EB85
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024EC6C push edi; ret 0_2_0024EC6E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_018F6341 push E8000009h; ret 1_2_018F6369
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00224A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00224A35
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002A53DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_002A53DF
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00243307 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00243307
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeAPI/Special instruction interceptor: Address: 123FAE4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 633Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4872Jump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98394
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeAPI coverage: 4.5 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_0028449B
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028C75D FindFirstFileW,FindClose,0_2_0028C75D
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0028C7E8
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0028F021
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0028F17E
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0028F47F
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00283833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00283833
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00283B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00283B56
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0028BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0028BD48
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00224AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00224AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99529Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98391Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98282Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98151Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98034Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97907Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97743Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeAPI call chain: ExitProcess graph end nodegraph_0-96873
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029401F BlockInput,0_2_0029401F
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00223B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00223B4C
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00255BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00255BFC
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029C104 LoadLibraryA,GetProcAddress,0_2_0029C104
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0123E6E0 mov eax, dword ptr fs:[00000030h]0_2_0123E6E0
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0123FD50 mov eax, dword ptr fs:[00000030h]0_2_0123FD50
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0123FDB0 mov eax, dword ptr fs:[00000030h]0_2_0123FDB0
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002781D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_002781D4
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024A2A4 SetUnhandledExceptionFilter,0_2_0024A2A4
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0024A2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0024A2D5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 11EE008Jump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00278A73 LogonUserW,0_2_00278A73
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00223B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00223B4C
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00224A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00224A35
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00284CFA mouse_event,0_2_00284CFA
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z25RFQ945894-PDF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002781D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_002781D4
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00284A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00284A08
                    Source: z25RFQ945894-PDF.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: z25RFQ945894-PDF.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002487AB cpuid 0_2_002487AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00255007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00255007
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0026215F GetUserNameW,0_2_0026215F
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_002540BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_002540BA
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00224AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00224AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2894103472.0000000003308000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2894103472.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z25RFQ945894-PDF.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_81
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_XP
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_XPe
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_VISTA
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_7
                    Source: z25RFQ945894-PDF.exeBinary or memory string: WIN_8
                    Source: z25RFQ945894-PDF.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2894103472.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z25RFQ945894-PDF.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z25RFQ945894-PDF.exe.1160000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2894103472.0000000003308000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2894103472.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z25RFQ945894-PDF.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_00296399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00296399
                    Source: C:\Users\user\Desktop\z25RFQ945894-PDF.exeCode function: 0_2_0029685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0029685D
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets241
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    z25RFQ945894-PDF.exe18%ReversingLabs
                    z25RFQ945894-PDF.exe16%VirustotalBrowse
                    z25RFQ945894-PDF.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    zqamcx.com9%VirustotalBrowse
                    15.164.165.52.in-addr.arpa0%VirustotalBrowse
                    mail.zqamcx.com9%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://account.dyn.com/0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://zqamcx.com9%VirustotalBrowse
                    http://mail.zqamcx.com9%VirustotalBrowse
                    http://r11.i.lencr.org/0#0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    zqamcx.com
                    78.110.166.82
                    truetrueunknown
                    15.164.165.52.in-addr.arpa
                    unknown
                    unknownfalseunknown
                    mail.zqamcx.com
                    unknown
                    unknowntrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://mail.zqamcx.comRegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    http://zqamcx.comRegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmptrueunknown
                    https://account.dyn.com/z25RFQ945894-PDF.exe, 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://r11.o.lencr.org0#RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://r11.i.lencr.org/0#RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2893472088.00000000014D7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2895612844.0000000006730000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      78.110.166.82
                      zqamcx.comUnited Kingdom
                      42831UKSERVERS-ASUKDedicatedServersHostingandCo-Locationtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1522581
                      Start date and time:2024-09-30 11:57:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 28s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:z25RFQ945894-PDF.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/2@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 54
                      • Number of non-executed functions: 270
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      05:57:58API Interceptor27x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      78.110.166.82COB756883.vbsGet hashmaliciousCobaltStrikeBrowse
                      • windowsupdatesolutions.com/ServerCOB.txt
                      Ingreso_SII_Abril_2021.cmdGet hashmaliciousUnknownBrowse
                      • www.emolcl.com/namaste/puma.php
                      Ingreso_SII_Abril_2021.cmdGet hashmaliciousUnknownBrowse
                      • www.emolcl.com/namaste/puma.php
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      zqamcx.comeFatura_ETN2024000000575_Ekleri.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      SecuriteInfo.com.Win32.MalwareX-gen.16545.12050.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      DOC25082024.bat.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      Halkbank_Ekstre_20240826_081429_424889.bat.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      UKSERVERS-ASUKDedicatedServersHostingandCo-Locationhttps://client31.webvalue.party/wp-content/uploads/weTranser_edited/weTranser_edited/index.php/Get hashmaliciousUnknownBrowse
                      • 5.101.173.45
                      https://client31.webvalue.party/wp-content/uploads/weTranser_edited/weTranser_edited/index.php?email%5C=3mail@b.cGet hashmaliciousUnknownBrowse
                      • 5.101.173.45
                      450230549.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      CCE_000110.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      https://qrplanet.com/smdv5p/Get hashmaliciousUnknownBrowse
                      • 5.101.173.45
                      22.09.2024-22.09.2024.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      Payment_Release-Now cnesst.gouv.qc.ca.htmlGet hashmaliciousUnknownBrowse
                      • 5.101.173.45
                      Payment Advice.pdf.jsGet hashmaliciousRemcosBrowse
                      • 178.159.12.230
                      eFatura_ETN2024000000575_Ekleri.exeGet hashmaliciousAgentTeslaBrowse
                      • 78.110.166.82
                      No context
                      No context
                      Process:C:\Users\user\Desktop\z25RFQ945894-PDF.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):154754
                      Entropy (8bit):7.878459591650458
                      Encrypted:false
                      SSDEEP:1536:llg3ykDSbGulpuTtO6XzlB5YtLaz/G8+/Oe20xSD+QtVhUG4bt7YRRVMJ0K0v2Hr:llPyQpAt/hYFarxbJRsyfMuK1gh4V3i+
                      MD5:6F3264F5C9F26E60D64A2811554F9DA4
                      SHA1:2D6A5E2B34A13916E8DC131D15D182461FCEF972
                      SHA-256:6DB18052CD5EEF9B5F6AC1A4056BC0EEA425C9306CDA2D72CAD4057BA98B127A
                      SHA-512:DE231E39B83A4CE501DD7901F0BF3B1EBE39D654B2061503178418538177CB2A00FCA7AEA0B5B75CF6F749A67ECA6E027852F095E1522DCB752F67DC5738D470
                      Malicious:false
                      Reputation:low
                      Preview:EA06.....[..Z.^qV.M)t...K..Uj.B.U...j,.E....`..D.R. .....g..8R%..}..E.^1U8.>....(7.4.7..'Q....%.Ml..u.'.X.3..v...J+SI...5.X..3.....^.6.Q.`...M)4.U..K..5j.`....]N.A..F.J@.....b@..J.U..Ff..Q.E..0...ne...f..-...8..4...&*@.....uhh......p......R(4....c.......$.s...B...8.a)..@...:.U....\...U.T.lU....@..$............8|....-h.K...=2.U.pv.....p...*>............K......F...T..X%D.R..)tz.....\..5.\d.....3..>..j.......o.T.w=.q........a66Y-K...c+7\.;qH.rs...*.D..u<.W..z.W.z..Cj.Lvu..........7..=|....U.Y........z.,..5.E6..6..!..os...u ...y.*...lh.....y..>....Z&....@.{t.Le.4...[.......b.p.B@..@@8.p..7.....8....l.Z..8Y......f....._.s.....7.........=..............46I..n.R.T..h..{U..n]q.Dw....k<.oj6i.....S+.J.N.W.U....ww..Y(u9.N.3......O..].7n.F....&.oN.%-..b1...v@1.C.U..F.Y.B.....M....8vv]*.^}5..j....+".L..I..)...b....*....U.......6..4J5..M..UMU..2.U'V.6BSa.Q..0...6..U+G..+.....@.p..(.i...C.R....RK}.U*rJ.B.A...h#.....S....6.G-PZ.V...Q&.......Q...LR.L..@...>.
                      Process:C:\Users\user\Desktop\z25RFQ945894-PDF.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):240128
                      Entropy (8bit):6.714326844933443
                      Encrypted:false
                      SSDEEP:6144:TIY/HWjbLhZwR2Fp+RXIT/Kgk4pyQSKLawCJBMd:TD/HsbLhZw8mYbBEHl/U
                      MD5:81C3B015449965F5DBAD3D7F42C9318C
                      SHA1:0B833B5B55FB25C59BA7922DCA216BFFDE404834
                      SHA-256:D3D3DD0BEDF335145F609115E6B6A6BA94A58156A0B6B56309B7BF577BEC5D9B
                      SHA-512:8E88D8663CDFCD1C0B9A44F038977C6187E022AE7AA61925E35F0620F0A511B67FF9F01ACC8CC0DF03219B4D0BB4359B1646041C01BDC1B03C0B27E2CA71F445
                      Malicious:false
                      Reputation:low
                      Preview:.o.EBW8VB4KA..LK.2RVBPTU.2PVE5PEAW8VF4KAADLKY2RVBPTUY2PVE5PE.W8VH+.OA.E.x.S..q.=0Ap&7Z77 :.5'Z%.5d..y@'8b9:u.}.v(Z4 oZ5\b4KAADLK.wRV.QWU6.F3E5PEAW8V.4I@JEGKY.QVBXTUY2PVK.SEAw8VF.HAAD.KY.RVBRTU]2PVE5PEEW8VF4KAADHKY0RVBPTU[2..E5@EAG8VF4[AATLKY2RVRPTUY2PVE5PE..;V.4KAA.OK.7RVBPTUY2PVE5PEAW8VF.HAMDLKY2RVBPTUY2PVE5PEAW8VF4KAADLKY2RVBPTUY2PVE5PEAW8VF.KAIDLKY2RVBPTUQ.PV.5PEAW8VF4KAo0)3-2RVV.WUY.PVE.SEAU8VF4KAADLKY2RVbPT5w@#$&5PE.R8VF.HAABLKY.QVBPTUY2PVE5PE.W8.hF.-.'LKU2RVB.WUY0PVE.SEAW8VF4KAADLK.2R.BPTUY2PVE5PEAW8V..HAADLK.2RV@PQU.RVU.QEBW8VG4KGADLKY2RVBPTUY2PVE5PEAW8VF4KAADLKY2RVBPTUY2PVE5PE\........9rA;5.p.7.V..C..L..N.-.= ...A....e%R..2.Yu..H...A.ID=M.....z0_$WZ.!j:1.\....j5...M7.(...*g.\Vr.....q.....N5....F..!?9{8B : ..$'6J?.6.@ADLK.......0J..h6_[uE@...uV4...<PTU=2PV75PE W8V.4KA.DLK72RV<PTU'2PV.5PE.W8Vq4KAdDLK42RVfPTU'2PV.H_J...?5..AADLKl..f.=...m.a..s0.F.$.... ...hW.._<..q....^.<t.Qf Gb..LX4VS@WPVU.^...dCS<SD3OBMyB...w.v.`...4...-.*F4KAAD.KY.RVB..U.2PV.5.E..8VF..A.D.K..V
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.990544688899181
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:z25RFQ945894-PDF.exe
                      File size:1'049'600 bytes
                      MD5:6cfb2ab5bfb52347d141ab2a82ab9ab2
                      SHA1:cdc4e03046d770a589e09ec9e9ba56f16afce2f5
                      SHA256:97aed74a1556b5b96eacd10c8ba1e206036d8f6fc35fab882689566c8c16aa6b
                      SHA512:52d9f6ebd2c088d765d022bfdc037476cece11e63753be3a4aa7bbf0b2d824291d19ecd9aa70ccc503b9c4356ad929c47a4072cb0e65abc3ba0cad3faa359367
                      SSDEEP:24576:VCdxte/80jYLT3U1jfsWaIsp0CL/rf6pQ:8w80cTsjkWaIs2GzV
                      TLSH:4225BE2273DDC360CB769173BF6AB7012EBF78614630B95B2F880D7DA950162162D7A3
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x427f4a
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66FA5A85 [Mon Sep 30 08:00:05 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                      Instruction
                      call 00007F9C68CCEC6Dh
                      jmp 00007F9C68CC1A34h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push edi
                      push esi
                      mov esi, dword ptr [esp+10h]
                      mov ecx, dword ptr [esp+14h]
                      mov edi, dword ptr [esp+0Ch]
                      mov eax, ecx
                      mov edx, ecx
                      add eax, esi
                      cmp edi, esi
                      jbe 00007F9C68CC1BBAh
                      cmp edi, eax
                      jc 00007F9C68CC1F1Eh
                      bt dword ptr [004C31FCh], 01h
                      jnc 00007F9C68CC1BB9h
                      rep movsb
                      jmp 00007F9C68CC1ECCh
                      cmp ecx, 00000080h
                      jc 00007F9C68CC1D84h
                      mov eax, edi
                      xor eax, esi
                      test eax, 0000000Fh
                      jne 00007F9C68CC1BC0h
                      bt dword ptr [004BE324h], 01h
                      jc 00007F9C68CC2090h
                      bt dword ptr [004C31FCh], 00000000h
                      jnc 00007F9C68CC1D5Dh
                      test edi, 00000003h
                      jne 00007F9C68CC1D6Eh
                      test esi, 00000003h
                      jne 00007F9C68CC1D4Dh
                      bt edi, 02h
                      jnc 00007F9C68CC1BBFh
                      mov eax, dword ptr [esi]
                      sub ecx, 04h
                      lea esi, dword ptr [esi+04h]
                      mov dword ptr [edi], eax
                      lea edi, dword ptr [edi+04h]
                      bt edi, 03h
                      jnc 00007F9C68CC1BC3h
                      movq xmm1, qword ptr [esi]
                      sub ecx, 08h
                      lea esi, dword ptr [esi+08h]
                      movq qword ptr [edi], xmm1
                      lea edi, dword ptr [edi+08h]
                      test esi, 00000007h
                      je 00007F9C68CC1C15h
                      bt esi, 03h
                      Programming Language:
                      • [ASM] VS2013 build 21005
                      • [ C ] VS2013 build 21005
                      • [C++] VS2013 build 21005
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      • [ASM] VS2013 UPD5 build 40629
                      • [RES] VS2013 build 21005
                      • [LNK] VS2013 UPD5 build 40629
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x37b30.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xff0000x7130.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x8dd2e0x8de00c2c2260508750422d20cd5cbb116b146False0.5729952505506608data6.675875439961112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x8f0000x2e10e0x2e2004513b58651e3d8d87c81a396e5b2f1d1False0.3353340955284553OpenPGP Public Key5.760731648769018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xbe0000x8f740x5200c2de4a3d214eae7e87c7bfc06bd79775False0.1017530487804878data1.1988106744719143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xc70000x37b300x37c00af246e57eba4fcebef615b6dd3284c1cFalse0.8817702494394619data7.780310717022067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xff0000x71300x72001254908a9a03d2bcf12045d49cd572b9False0.7703536184210527data6.782377328042204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                      RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                      RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xcf7b80x2edf7data1.0003437661140366
                      RT_GROUP_ICON0xfe5b00x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0xfe6280x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0xfe63c0x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0xfe6500x14dataEnglishGreat Britain1.25
                      RT_VERSION0xfe6640xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0xfe7400x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 30, 2024 11:57:59.643127918 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:57:59.648106098 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:57:59.648190975 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:00.294986963 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.296169996 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:00.301047087 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.463068008 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.463265896 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:00.469660044 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.634809971 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.642335892 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:00.647222996 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.996187925 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.996277094 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.996329069 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:00.996342897 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.996385098 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:00.996434927 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.024333000 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.029246092 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.190937042 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.208976030 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.213860035 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.375519991 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.384594917 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.389422894 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.550925016 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.554599047 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.559482098 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.748342037 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.754344940 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.759278059 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.921029091 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:01.921408892 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:01.926378012 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.095078945 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.095372915 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:02.100356102 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.261939049 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.266710997 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:02.266753912 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:02.266774893 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:02.266791105 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:58:02.271773100 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.271817923 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.271868944 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.567447901 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:58:02.615195036 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:59:39.412558079 CEST49730587192.168.2.478.110.166.82
                      Sep 30, 2024 11:59:39.417604923 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:59:39.579550028 CEST5874973078.110.166.82192.168.2.4
                      Sep 30, 2024 11:59:39.583676100 CEST49730587192.168.2.478.110.166.82
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 30, 2024 11:57:59.385919094 CEST5960053192.168.2.41.1.1.1
                      Sep 30, 2024 11:57:59.635849953 CEST53596001.1.1.1192.168.2.4
                      Sep 30, 2024 11:58:29.608107090 CEST5356454162.159.36.2192.168.2.4
                      Sep 30, 2024 11:58:30.100816011 CEST6241753192.168.2.41.1.1.1
                      Sep 30, 2024 11:58:30.108664036 CEST53624171.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 30, 2024 11:57:59.385919094 CEST192.168.2.41.1.1.10x7bb6Standard query (0)mail.zqamcx.comA (IP address)IN (0x0001)false
                      Sep 30, 2024 11:58:30.100816011 CEST192.168.2.41.1.1.10x8820Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 30, 2024 11:57:59.635849953 CEST1.1.1.1192.168.2.40x7bb6No error (0)mail.zqamcx.comzqamcx.comCNAME (Canonical name)IN (0x0001)false
                      Sep 30, 2024 11:57:59.635849953 CEST1.1.1.1192.168.2.40x7bb6No error (0)zqamcx.com78.110.166.82A (IP address)IN (0x0001)false
                      Sep 30, 2024 11:58:30.108664036 CEST1.1.1.1192.168.2.40x8820Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Sep 30, 2024 11:58:00.294986963 CEST5874973078.110.166.82192.168.2.4220-cphost14.qhoster.net ESMTP Exim 4.96.2 #2 Mon, 30 Sep 2024 10:58:00 +0100
                      220-We do not authorize the use of this system to transport unsolicited,
                      220 and/or bulk e-mail.
                      Sep 30, 2024 11:58:00.296169996 CEST49730587192.168.2.478.110.166.82EHLO 216865
                      Sep 30, 2024 11:58:00.463068008 CEST5874973078.110.166.82192.168.2.4250-cphost14.qhoster.net Hello 216865 [8.46.123.33]
                      250-SIZE 52428800
                      250-8BITMIME
                      250-PIPELINING
                      250-PIPECONNECT
                      250-STARTTLS
                      250 HELP
                      Sep 30, 2024 11:58:00.463265896 CEST49730587192.168.2.478.110.166.82STARTTLS
                      Sep 30, 2024 11:58:00.634809971 CEST5874973078.110.166.82192.168.2.4220 TLS go ahead

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:05:57:56
                      Start date:30/09/2024
                      Path:C:\Users\user\Desktop\z25RFQ945894-PDF.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
                      Imagebase:0x220000
                      File size:1'049'600 bytes
                      MD5 hash:6CFB2AB5BFB52347D141AB2A82AB9AB2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1664669287.0000000001160000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:05:57:57
                      Start date:30/09/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\z25RFQ945894-PDF.exe"
                      Imagebase:0xf20000
                      File size:45'984 bytes
                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2894103472.00000000032DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2894103472.0000000003308000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2893009529.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2894103472.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2894103472.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:3.9%
                        Dynamic/Decrypted Code Coverage:1.5%
                        Signature Coverage:6.5%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:74
                        execution_graph 96711 223633 96712 22366a 96711->96712 96713 2236e7 96712->96713 96714 223688 96712->96714 96751 2236e5 96712->96751 96716 25d24c 96713->96716 96717 2236ed 96713->96717 96718 223695 96714->96718 96719 22375d PostQuitMessage 96714->96719 96715 2236ca DefWindowProcW 96753 2236d8 96715->96753 96761 2311d0 10 API calls Mailbox 96716->96761 96720 2236f2 96717->96720 96721 223715 SetTimer RegisterWindowMessageW 96717->96721 96722 2236a0 96718->96722 96723 25d2bf 96718->96723 96719->96753 96726 25d1ef 96720->96726 96727 2236f9 KillTimer 96720->96727 96728 22373e CreatePopupMenu 96721->96728 96721->96753 96729 223767 96722->96729 96730 2236a8 96722->96730 96776 28281f 71 API calls _memset 96723->96776 96725 25d273 96762 2311f3 341 API calls Mailbox 96725->96762 96734 25d1f4 96726->96734 96735 25d228 MoveWindow 96726->96735 96756 2244cb Shell_NotifyIconW _memset 96727->96756 96728->96753 96759 224531 64 API calls _memset 96729->96759 96737 2236b3 96730->96737 96745 25d2a4 96730->96745 96742 25d217 SetFocus 96734->96742 96743 25d1f8 96734->96743 96735->96753 96738 22374b 96737->96738 96739 2236be 96737->96739 96758 2245df 81 API calls _memset 96738->96758 96739->96715 96763 2244cb Shell_NotifyIconW _memset 96739->96763 96740 25d2d1 96740->96715 96740->96753 96741 22375b 96741->96753 96742->96753 96743->96739 96747 25d201 96743->96747 96744 22370c 96757 223114 DeleteObject DestroyWindow Mailbox 96744->96757 96745->96715 96775 277f5e 59 API calls Mailbox 96745->96775 96760 2311d0 10 API calls Mailbox 96747->96760 96751->96715 96754 25d298 96764 2243db 96754->96764 96756->96744 96757->96753 96758->96741 96759->96741 96760->96753 96761->96725 96762->96739 96763->96754 96765 224406 _memset 96764->96765 96777 224213 96765->96777 96769 2244c1 Shell_NotifyIconW 96772 2244b3 96769->96772 96770 2244a5 Shell_NotifyIconW 96770->96772 96771 22448b 96771->96769 96771->96770 96781 22410d 96772->96781 96774 2244ba 96774->96751 96775->96751 96776->96740 96778 224227 96777->96778 96779 25d568 96777->96779 96778->96771 96803 28302e 62 API calls _W_store_winword 96778->96803 96779->96778 96780 25d571 DestroyIcon 96779->96780 96780->96778 96782 224129 96781->96782 96801 224200 Mailbox 96781->96801 96804 227b76 96782->96804 96785 224144 96809 227d2c 96785->96809 96786 25d50d LoadStringW 96789 25d527 96786->96789 96788 224159 96788->96789 96791 22416a 96788->96791 96790 227c8e 59 API calls 96789->96790 96796 25d531 96790->96796 96792 224174 96791->96792 96793 224205 96791->96793 96818 227c8e 96792->96818 96827 2281a7 96793->96827 96802 22417e _memset _wcscpy 96796->96802 96831 227e0b 96796->96831 96798 25d553 96800 227e0b 59 API calls 96798->96800 96799 2241e6 Shell_NotifyIconW 96799->96801 96800->96802 96801->96774 96802->96799 96803->96771 96838 240f36 96804->96838 96806 227b9b 96848 228189 96806->96848 96810 227da5 96809->96810 96812 227d38 __NMSG_WRITE 96809->96812 96880 227e8c 96810->96880 96813 227d73 96812->96813 96814 227d4e 96812->96814 96816 228189 59 API calls 96813->96816 96879 228087 59 API calls Mailbox 96814->96879 96817 227d56 _memmove 96816->96817 96817->96788 96819 25efc4 96818->96819 96820 227ca0 96818->96820 96894 277f03 59 API calls _memmove 96819->96894 96888 227bb1 96820->96888 96823 25efce 96825 2281a7 59 API calls 96823->96825 96824 227cac 96824->96802 96826 25efd6 Mailbox 96825->96826 96828 2281b2 96827->96828 96829 2281ba 96827->96829 96895 2280d7 59 API calls 2 library calls 96828->96895 96829->96802 96832 25f0a3 96831->96832 96833 227e1f 96831->96833 96835 228189 59 API calls 96832->96835 96896 227db0 96833->96896 96837 25f0ae __NMSG_WRITE _memmove 96835->96837 96836 227e2a 96836->96798 96839 240f3e 96838->96839 96841 240f58 96839->96841 96843 240f5c std::exception::exception 96839->96843 96851 24588c 96839->96851 96868 243521 DecodePointer 96839->96868 96841->96806 96869 24871b RaiseException 96843->96869 96845 240f86 96870 248651 58 API calls _free 96845->96870 96847 240f98 96847->96806 96849 240f36 Mailbox 59 API calls 96848->96849 96850 224137 96849->96850 96850->96785 96850->96786 96852 245907 96851->96852 96855 245898 96851->96855 96877 243521 DecodePointer 96852->96877 96854 24590d 96878 248ca8 58 API calls __getptd_noexit 96854->96878 96858 2458cb RtlAllocateHeap 96855->96858 96860 2458a3 96855->96860 96862 2458f3 96855->96862 96866 2458f1 96855->96866 96874 243521 DecodePointer 96855->96874 96858->96855 96859 2458ff 96858->96859 96859->96839 96860->96855 96871 24a2eb 58 API calls __NMSG_WRITE 96860->96871 96872 24a348 58 API calls 5 library calls 96860->96872 96873 24321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 96860->96873 96875 248ca8 58 API calls __getptd_noexit 96862->96875 96876 248ca8 58 API calls __getptd_noexit 96866->96876 96868->96839 96869->96845 96870->96847 96871->96860 96872->96860 96874->96855 96875->96866 96876->96859 96877->96854 96878->96859 96879->96817 96881 227e9a 96880->96881 96883 227ea3 _memmove 96880->96883 96881->96883 96884 227faf 96881->96884 96883->96817 96885 227fc2 96884->96885 96887 227fbf _memmove 96884->96887 96886 240f36 Mailbox 59 API calls 96885->96886 96886->96887 96887->96883 96889 227bbf 96888->96889 96890 227be5 _memmove 96888->96890 96889->96890 96891 240f36 Mailbox 59 API calls 96889->96891 96890->96824 96892 227c34 96891->96892 96893 240f36 Mailbox 59 API calls 96892->96893 96893->96890 96894->96823 96895->96829 96897 227dbf __NMSG_WRITE 96896->96897 96898 228189 59 API calls 96897->96898 96899 227dd0 _memmove 96897->96899 96900 25f060 _memmove 96898->96900 96899->96836 96901 123ec20 96915 123c870 96901->96915 96903 123ed20 96918 123eb10 96903->96918 96917 123cefb 96915->96917 96921 123fd50 GetPEB 96915->96921 96917->96903 96919 123eb19 Sleep 96918->96919 96920 123eb27 96919->96920 96921->96917 96922 260155 96923 22ade2 Mailbox 96922->96923 96925 260bb5 96923->96925 96927 260bbe 96923->96927 96930 22b6c1 96923->96930 96933 2a2343 96923->96933 96962 229df0 59 API calls Mailbox 96923->96962 96963 228e34 59 API calls Mailbox 96923->96963 96964 2771e5 59 API calls 96923->96964 96966 2763f2 59 API calls Mailbox 96925->96966 96965 289ed4 89 API calls 4 library calls 96930->96965 96967 229997 96933->96967 96936 227b76 59 API calls 96937 2a236c 96936->96937 96938 2a239a 96937->96938 97021 229c9c 59 API calls 96937->97021 96985 235bfd 96938->96985 96941 2a237d 96941->96938 96943 2a2382 96941->96943 96945 2281a7 59 API calls 96943->96945 96947 2a238c Mailbox 96945->96947 97026 229b9c 59 API calls Mailbox 96947->97026 96949 2a23c0 Mailbox 97001 235d24 96949->97001 96953 2a2474 Mailbox 96953->96923 96955 2a2429 96959 227c8e 59 API calls 96955->96959 96960 2a2443 Mailbox 96955->96960 96957 2a23f2 96957->96955 97009 276511 96957->97009 97015 223f84 96957->97015 96959->96955 97022 235c2e 96960->97022 96962->96923 96963->96923 96964->96923 96965->96925 96966->96927 96968 2299b1 96967->96968 96977 2299ab 96967->96977 96969 2299f9 96968->96969 96970 2299b7 __itow 96968->96970 96974 25f833 96968->96974 96975 25f92c __i64tow 96968->96975 97027 243818 83 API calls 3 library calls 96969->97027 96973 240f36 Mailbox 59 API calls 96970->96973 96976 2299d1 96973->96976 96978 240f36 Mailbox 59 API calls 96974->96978 96983 25f8ab Mailbox _wcscpy 96974->96983 96976->96977 96979 227f41 59 API calls 96976->96979 96977->96936 96980 25f878 96978->96980 96979->96977 96981 240f36 Mailbox 59 API calls 96980->96981 96982 25f89e 96981->96982 96982->96983 96984 227f41 59 API calls 96982->96984 97028 243818 83 API calls 3 library calls 96983->97028 96984->96983 96986 2277c7 59 API calls 96985->96986 96987 235c05 96986->96987 96988 227f41 96987->96988 96989 227f50 __NMSG_WRITE _memmove 96988->96989 96990 240f36 Mailbox 59 API calls 96989->96990 96991 227f8e 96990->96991 96992 235c72 96991->96992 96993 235c2e 59 API calls 96992->96993 96994 235c80 96993->96994 96995 235c8f 96994->96995 97029 236841 61 API calls 2 library calls 96994->97029 96997 240f36 Mailbox 59 API calls 96995->96997 96998 235cb9 96997->96998 96998->96949 96999 235cdc 96999->96998 97030 235d92 59 API calls Mailbox 96999->97030 97002 2281a7 59 API calls 97001->97002 97003 235d32 97002->97003 97004 2277c7 97003->97004 97005 240f36 Mailbox 59 API calls 97004->97005 97006 2277e8 97005->97006 97007 240f36 Mailbox 59 API calls 97006->97007 97008 2277f6 97007->97008 97008->96957 97010 27651c 97009->97010 97011 27652a 97009->97011 97012 227e8c 59 API calls 97010->97012 97031 2278ad 97011->97031 97014 276528 97012->97014 97014->96957 97016 223f92 97015->97016 97017 223fb4 _memmove 97015->97017 97019 240f36 Mailbox 59 API calls 97016->97019 97018 240f36 Mailbox 59 API calls 97017->97018 97020 223fc8 97018->97020 97019->97017 97020->96957 97021->96941 97023 235c38 97022->97023 97044 227eec 97023->97044 97025 235c53 97025->96947 97026->96953 97027->96970 97028->96975 97029->96999 97030->96995 97032 22792f 97031->97032 97033 2278bc 97031->97033 97034 227e8c 59 API calls 97032->97034 97033->97032 97035 2278c8 97033->97035 97041 2278da _memmove 97034->97041 97036 2278d2 97035->97036 97037 227900 97035->97037 97043 228087 59 API calls Mailbox 97036->97043 97039 228189 59 API calls 97037->97039 97040 22790a 97039->97040 97042 240f36 Mailbox 59 API calls 97040->97042 97041->97014 97042->97041 97043->97041 97045 227f06 97044->97045 97047 227ef9 97044->97047 97046 240f36 Mailbox 59 API calls 97045->97046 97046->97047 97047->97025 97048 221016 97053 224ad2 97048->97053 97054 240f36 Mailbox 59 API calls 97053->97054 97055 224ada 97054->97055 97056 22101b 97055->97056 97063 224a94 97055->97063 97060 242ec0 97056->97060 97099 242dc4 97060->97099 97062 221025 97064 224aaf 97063->97064 97065 224a9d 97063->97065 97067 224afe 97064->97067 97066 242ec0 __cinit 67 API calls 97065->97066 97066->97064 97068 2277c7 59 API calls 97067->97068 97069 224b16 GetVersionExW 97068->97069 97070 227d2c 59 API calls 97069->97070 97071 224b59 97070->97071 97072 227e8c 59 API calls 97071->97072 97081 224b86 97071->97081 97073 224b7a 97072->97073 97095 227886 97073->97095 97075 224bf1 GetCurrentProcess IsWow64Process 97076 224c0a 97075->97076 97078 224c20 97076->97078 97079 224c89 GetSystemInfo 97076->97079 97077 25dbbd 97091 224c95 97078->97091 97080 224c56 97079->97080 97080->97056 97081->97075 97081->97077 97084 224c32 97086 224c95 2 API calls 97084->97086 97085 224c7d GetSystemInfo 97087 224c47 97085->97087 97088 224c3a GetNativeSystemInfo 97086->97088 97087->97080 97089 224c4d FreeLibrary 97087->97089 97088->97087 97089->97080 97092 224c2e 97091->97092 97093 224c9e LoadLibraryA 97091->97093 97092->97084 97092->97085 97093->97092 97094 224caf GetProcAddress 97093->97094 97094->97092 97096 227894 97095->97096 97097 227e8c 59 API calls 97096->97097 97098 2278a4 97097->97098 97098->97081 97100 242dd0 __ioinit 97099->97100 97107 243397 97100->97107 97106 242df7 __ioinit 97106->97062 97124 249d8b 97107->97124 97109 242dd9 97110 242e08 DecodePointer DecodePointer 97109->97110 97111 242e35 97110->97111 97112 242de5 97110->97112 97111->97112 97170 248924 59 API calls __write 97111->97170 97121 242e02 97112->97121 97114 242e98 EncodePointer EncodePointer 97114->97112 97115 242e47 97115->97114 97116 242e6c 97115->97116 97171 2489e4 61 API calls __realloc_crt 97115->97171 97116->97112 97119 242e86 EncodePointer 97116->97119 97172 2489e4 61 API calls __realloc_crt 97116->97172 97119->97114 97120 242e80 97120->97112 97120->97119 97173 2433a0 97121->97173 97125 249d9c 97124->97125 97126 249daf EnterCriticalSection 97124->97126 97131 249e13 97125->97131 97126->97109 97128 249da2 97128->97126 97155 243235 58 API calls 3 library calls 97128->97155 97132 249e1f __ioinit 97131->97132 97133 249e40 97132->97133 97134 249e28 97132->97134 97138 249e61 __ioinit 97133->97138 97159 24899d 58 API calls 2 library calls 97133->97159 97156 24a2eb 58 API calls __NMSG_WRITE 97134->97156 97136 249e2d 97157 24a348 58 API calls 5 library calls 97136->97157 97138->97128 97140 249e55 97142 249e5c 97140->97142 97143 249e6b 97140->97143 97141 249e34 97158 24321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97141->97158 97160 248ca8 58 API calls __getptd_noexit 97142->97160 97145 249d8b __lock 58 API calls 97143->97145 97147 249e72 97145->97147 97149 249e97 97147->97149 97150 249e7f 97147->97150 97162 242ed5 97149->97162 97161 249fab InitializeCriticalSectionAndSpinCount 97150->97161 97153 249e8b 97168 249eb3 LeaveCriticalSection _doexit 97153->97168 97156->97136 97157->97141 97159->97140 97160->97138 97161->97153 97163 242ede RtlFreeHeap 97162->97163 97164 242f07 _free 97162->97164 97163->97164 97165 242ef3 97163->97165 97164->97153 97169 248ca8 58 API calls __getptd_noexit 97165->97169 97167 242ef9 GetLastError 97167->97164 97168->97138 97169->97167 97170->97115 97171->97116 97172->97120 97176 249ef5 LeaveCriticalSection 97173->97176 97175 242e07 97175->97106 97176->97175 97177 221066 97182 22f8cf 97177->97182 97179 22106c 97180 242ec0 __cinit 67 API calls 97179->97180 97181 221076 97180->97181 97183 22f8f0 97182->97183 97215 240083 97183->97215 97187 22f937 97188 2277c7 59 API calls 97187->97188 97189 22f941 97188->97189 97190 2277c7 59 API calls 97189->97190 97191 22f94b 97190->97191 97192 2277c7 59 API calls 97191->97192 97193 22f955 97192->97193 97194 2277c7 59 API calls 97193->97194 97195 22f993 97194->97195 97196 2277c7 59 API calls 97195->97196 97197 22fa5e 97196->97197 97225 2360e7 97197->97225 97201 22fa90 97202 2277c7 59 API calls 97201->97202 97203 22fa9a 97202->97203 97253 23ff1e 97203->97253 97205 22fae1 97206 22faf1 GetStdHandle 97205->97206 97207 264904 97206->97207 97208 22fb3d 97206->97208 97207->97208 97210 26490d 97207->97210 97209 22fb45 OleInitialize 97208->97209 97209->97179 97260 286be1 64 API calls Mailbox 97210->97260 97212 264914 97261 2872b0 CreateThread 97212->97261 97214 264920 CloseHandle 97214->97209 97262 24015c 97215->97262 97218 24015c 59 API calls 97219 2400c5 97218->97219 97220 2277c7 59 API calls 97219->97220 97221 2400d1 97220->97221 97222 227d2c 59 API calls 97221->97222 97223 22f8f6 97222->97223 97224 2402e2 6 API calls 97223->97224 97224->97187 97226 2277c7 59 API calls 97225->97226 97227 2360f7 97226->97227 97228 2277c7 59 API calls 97227->97228 97229 2360ff 97228->97229 97230 235bfd 59 API calls 97229->97230 97231 236107 97230->97231 97232 235bfd 59 API calls 97231->97232 97233 23610f 97232->97233 97234 2277c7 59 API calls 97233->97234 97235 23611a 97234->97235 97236 240f36 Mailbox 59 API calls 97235->97236 97237 22fa68 97236->97237 97238 236259 97237->97238 97239 236267 97238->97239 97240 2277c7 59 API calls 97239->97240 97241 236272 97240->97241 97242 2277c7 59 API calls 97241->97242 97243 23627d 97242->97243 97244 2277c7 59 API calls 97243->97244 97245 236288 97244->97245 97246 2277c7 59 API calls 97245->97246 97247 236293 97246->97247 97248 235bfd 59 API calls 97247->97248 97249 23629e 97248->97249 97250 240f36 Mailbox 59 API calls 97249->97250 97251 2362a5 RegisterWindowMessageW 97250->97251 97251->97201 97254 275ac5 97253->97254 97255 23ff2e 97253->97255 97269 289b90 60 API calls 97254->97269 97256 240f36 Mailbox 59 API calls 97255->97256 97259 23ff36 97256->97259 97258 275ad0 97259->97205 97260->97212 97261->97214 97270 287296 65 API calls 97261->97270 97263 2277c7 59 API calls 97262->97263 97264 240167 97263->97264 97265 2277c7 59 API calls 97264->97265 97266 24016f 97265->97266 97267 2277c7 59 API calls 97266->97267 97268 2400bb 97267->97268 97268->97218 97269->97258 97271 260180 97283 23fac4 97271->97283 97273 260196 97274 260217 97273->97274 97275 2601ac 97273->97275 97292 22fe40 97274->97292 97372 229fbd 60 API calls 97275->97372 97277 26020b Mailbox 97281 260c10 Mailbox 97277->97281 97374 289ed4 89 API calls 4 library calls 97277->97374 97280 2601eb 97280->97277 97373 2883f8 59 API calls Mailbox 97280->97373 97284 23fae2 97283->97284 97285 23fad0 97283->97285 97287 23fb11 97284->97287 97288 23fae8 97284->97288 97375 229e9c 60 API calls Mailbox 97285->97375 97376 229e9c 60 API calls Mailbox 97287->97376 97289 240f36 Mailbox 59 API calls 97288->97289 97291 23fada 97289->97291 97291->97273 97377 2282e0 97292->97377 97294 22fe9d 97295 230856 97294->97295 97297 264a86 97294->97297 97382 22f394 97294->97382 97498 289ed4 89 API calls 4 library calls 97295->97498 97499 289ed4 89 API calls 4 library calls 97297->97499 97300 264a9b 97301 22ff9e 97302 264be6 97301->97302 97306 22ffac 97301->97306 97503 276a42 59 API calls 2 library calls 97301->97503 97302->97300 97302->97306 97505 29a3ee 85 API calls Mailbox 97302->97505 97303 230677 97311 240f36 Mailbox 59 API calls 97303->97311 97312 264c52 97306->97312 97359 264eac 97306->97359 97386 2284dc 97306->97386 97307 264b30 97307->97300 97501 289ed4 89 API calls 4 library calls 97307->97501 97308 264ba1 97504 276363 59 API calls 2 library calls 97308->97504 97321 2306a5 _memmove 97311->97321 97322 264c70 97312->97322 97507 228720 59 API calls Mailbox 97312->97507 97315 264aae 97315->97307 97500 22f803 341 API calls 97315->97500 97317 230004 97328 230092 97317->97328 97329 264e2f 97317->97329 97366 2302d9 Mailbox _memmove 97317->97366 97318 264bc4 97323 22a000 341 API calls 97318->97323 97319 264c0b Mailbox 97319->97306 97506 276a42 59 API calls 2 library calls 97319->97506 97330 240f36 Mailbox 59 API calls 97321->97330 97326 264c81 97322->97326 97508 228720 59 API calls Mailbox 97322->97508 97323->97302 97324 240f36 59 API calls Mailbox 97335 22ff33 97324->97335 97326->97366 97509 27631f 59 API calls Mailbox 97326->97509 97332 240f36 Mailbox 59 API calls 97328->97332 97518 289b90 60 API calls 97329->97518 97370 230266 _memmove 97330->97370 97336 230099 97332->97336 97335->97300 97335->97301 97335->97303 97335->97315 97335->97321 97335->97324 97344 264b65 97335->97344 97474 22a000 97335->97474 97336->97295 97393 230b30 97336->97393 97338 264da6 97339 22a000 341 API calls 97338->97339 97341 264de0 97339->97341 97341->97300 97513 228620 97341->97513 97343 230112 97343->97295 97343->97321 97350 230146 97343->97350 97502 289ed4 89 API calls 4 library calls 97344->97502 97348 264e0b 97517 289ed4 89 API calls 4 library calls 97348->97517 97353 2281a7 59 API calls 97350->97353 97356 230167 97350->97356 97353->97356 97355 2304f8 97355->97277 97356->97295 97358 264e7d 97356->97358 97362 2301ac 97356->97362 97357 240f36 59 API calls Mailbox 97357->97366 97519 229e9c 60 API calls Mailbox 97358->97519 97359->97300 97520 289ed4 89 API calls 4 library calls 97359->97520 97361 230238 97470 229e9c 60 API calls Mailbox 97361->97470 97362->97295 97362->97359 97362->97361 97364 264d75 97367 240f36 Mailbox 59 API calls 97364->97367 97365 23024b 97365->97295 97471 22843f 59 API calls Mailbox 97365->97471 97366->97295 97366->97338 97366->97348 97366->97355 97366->97357 97366->97364 97472 2288a0 68 API calls __cinit 97366->97472 97473 2287c0 68 API calls 97366->97473 97510 2859de 68 API calls 97366->97510 97511 228b13 69 API calls Mailbox 97366->97511 97512 229e9c 60 API calls Mailbox 97366->97512 97367->97338 97370->97366 97371 2302c2 97370->97371 97497 229df0 59 API calls Mailbox 97370->97497 97371->97277 97372->97280 97373->97277 97374->97281 97375->97291 97376->97291 97378 2282ef 97377->97378 97381 22830a 97377->97381 97379 227faf 59 API calls 97378->97379 97380 2282f7 CharUpperBuffW 97379->97380 97380->97381 97381->97294 97383 22f3b1 97382->97383 97384 22f3d2 97383->97384 97521 289ed4 89 API calls 4 library calls 97383->97521 97384->97335 97387 25f116 97386->97387 97388 2284ed 97386->97388 97389 240f36 Mailbox 59 API calls 97388->97389 97390 2284f4 97389->97390 97391 228515 97390->97391 97522 228794 59 API calls Mailbox 97390->97522 97391->97312 97391->97317 97394 26501c 97393->97394 97405 230b55 97393->97405 97586 289ed4 89 API calls 4 library calls 97394->97586 97396 230e5a 97396->97343 97398 231044 97398->97396 97400 231051 97398->97400 97584 2311f3 341 API calls Mailbox 97400->97584 97401 230bab PeekMessageW 97468 230b65 Mailbox 97401->97468 97403 231058 LockWindowUpdate DestroyWindow GetMessageW 97403->97396 97407 23108a 97403->97407 97405->97468 97587 229fbd 60 API calls 97405->97587 97588 27669f 341 API calls 97405->97588 97406 2651da Sleep 97406->97468 97410 265fb1 TranslateMessage DispatchMessageW GetMessageW 97407->97410 97408 230e44 97408->97396 97583 2311d0 10 API calls Mailbox 97408->97583 97410->97410 97411 265fe1 97410->97411 97411->97396 97412 230fa3 PeekMessageW 97412->97468 97413 231005 TranslateMessage DispatchMessageW 97413->97412 97414 2650a9 TranslateAcceleratorW 97414->97412 97414->97468 97415 229fbd 60 API calls 97415->97468 97416 230e73 timeGetTime 97416->97468 97417 265b78 WaitForSingleObject 97420 265b95 GetExitCodeProcess CloseHandle 97417->97420 97417->97468 97419 240f36 59 API calls Mailbox 97419->97468 97451 2310f5 97420->97451 97421 230fbf Sleep 97453 230fd0 Mailbox 97421->97453 97422 2281a7 59 API calls 97422->97468 97423 2277c7 59 API calls 97423->97453 97424 265e51 Sleep 97424->97453 97426 24034a timeGetTime 97426->97453 97428 2310ae timeGetTime 97585 229fbd 60 API calls 97428->97585 97431 265ee8 GetExitCodeProcess 97435 265f14 CloseHandle 97431->97435 97436 265efe WaitForSingleObject 97431->97436 97432 229997 84 API calls 97432->97468 97433 2a5f8e 110 API calls 97433->97453 97434 22b93d 109 API calls 97434->97453 97435->97453 97436->97435 97436->97468 97439 265bcd 97439->97451 97440 2653d1 Sleep 97440->97468 97441 265f70 Sleep 97441->97468 97443 227f41 59 API calls 97443->97453 97449 22fe40 314 API calls 97449->97468 97451->97343 97453->97423 97453->97426 97453->97431 97453->97433 97453->97434 97453->97439 97453->97440 97453->97441 97453->97443 97453->97451 97453->97468 97595 282700 60 API calls 97453->97595 97596 229fbd 60 API calls 97453->97596 97597 228b13 69 API calls Mailbox 97453->97597 97598 22b89c 341 API calls 97453->97598 97599 276830 60 API calls 97453->97599 97600 2852eb QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97453->97600 97601 283c99 66 API calls Mailbox 97453->97601 97454 228620 69 API calls 97454->97468 97456 289ed4 89 API calls 97456->97468 97457 228b13 69 API calls 97457->97468 97458 229df0 59 API calls Mailbox 97458->97468 97459 22a000 314 API calls 97459->97468 97461 2763f2 59 API calls Mailbox 97461->97468 97462 227f41 59 API calls 97462->97468 97463 26592e VariantClear 97463->97468 97464 2659c4 VariantClear 97464->97468 97465 228e34 59 API calls Mailbox 97465->97468 97466 265772 VariantClear 97466->97468 97467 2771e5 59 API calls 97467->97468 97468->97401 97468->97406 97468->97408 97468->97412 97468->97413 97468->97414 97468->97415 97468->97416 97468->97417 97468->97419 97468->97421 97468->97422 97468->97424 97468->97428 97468->97432 97468->97449 97468->97451 97468->97453 97468->97454 97468->97456 97468->97457 97468->97458 97468->97459 97468->97461 97468->97462 97468->97463 97468->97464 97468->97465 97468->97466 97468->97467 97469 22b89c 314 API calls 97468->97469 97523 22e580 97468->97523 97531 22e800 97468->97531 97562 22f5c0 97468->97562 97582 2231ce IsDialogMessageW GetClassLongW 97468->97582 97589 2a6081 59 API calls 97468->97589 97590 289abe 59 API calls Mailbox 97468->97590 97591 27d801 59 API calls 97468->97591 97592 276363 59 API calls 2 library calls 97468->97592 97593 228561 59 API calls 97468->97593 97594 22843f 59 API calls Mailbox 97468->97594 97469->97468 97470->97365 97471->97370 97472->97366 97473->97366 97475 22a01f 97474->97475 97492 22a04d Mailbox 97474->97492 97476 240f36 Mailbox 59 API calls 97475->97476 97476->97492 97477 22b5d5 97478 2281a7 59 API calls 97477->97478 97490 22a1b7 97478->97490 97479 2277c7 59 API calls 97479->97492 97482 2281a7 59 API calls 97482->97492 97483 240f36 59 API calls Mailbox 97483->97492 97485 2603ae 98733 289ed4 89 API calls 4 library calls 97485->98733 97488 2603bd 97488->97335 97489 242ec0 67 API calls __cinit 97489->97492 97490->97335 97491 2771e5 59 API calls 97491->97492 97492->97477 97492->97479 97492->97482 97492->97483 97492->97485 97492->97489 97492->97490 97492->97491 97493 260d2f 97492->97493 97495 22a6ba 97492->97495 97496 22b5da 97492->97496 98731 22ca20 341 API calls 2 library calls 97492->98731 98732 22ba60 60 API calls Mailbox 97492->98732 98735 289ed4 89 API calls 4 library calls 97493->98735 98734 289ed4 89 API calls 4 library calls 97495->98734 98736 289ed4 89 API calls 4 library calls 97496->98736 97497->97370 97498->97297 97499->97300 97500->97307 97501->97300 97502->97300 97503->97308 97504->97318 97505->97319 97506->97319 97507->97322 97508->97326 97509->97366 97510->97366 97511->97366 97512->97366 97514 22862b 97513->97514 97516 228652 97514->97516 98737 228b13 69 API calls Mailbox 97514->98737 97516->97348 97517->97300 97518->97350 97519->97359 97520->97300 97521->97384 97522->97391 97524 22e58d 97523->97524 97525 22e5b1 97524->97525 97526 22e59d 97524->97526 97603 289ed4 89 API calls 4 library calls 97525->97603 97602 22e060 341 API calls 2 library calls 97526->97602 97529 22e5a8 97529->97468 97530 263dfd 97530->97530 97532 22e835 97531->97532 97533 263e02 97532->97533 97536 22e89f 97532->97536 97545 22e8f9 97532->97545 97534 22a000 341 API calls 97533->97534 97535 263e17 97534->97535 97559 22ead0 Mailbox 97535->97559 97605 289ed4 89 API calls 4 library calls 97535->97605 97539 2277c7 59 API calls 97536->97539 97536->97545 97537 2277c7 59 API calls 97537->97545 97541 263e5d 97539->97541 97540 242ec0 __cinit 67 API calls 97540->97545 97543 242ec0 __cinit 67 API calls 97541->97543 97542 263e7f 97542->97468 97543->97545 97544 228620 69 API calls 97544->97559 97545->97537 97545->97540 97545->97542 97549 22eaba 97545->97549 97545->97559 97546 22a000 341 API calls 97546->97559 97548 22f2f5 97610 289ed4 89 API calls 4 library calls 97548->97610 97549->97559 97606 289ed4 89 API calls 4 library calls 97549->97606 97550 228ea0 59 API calls 97550->97559 97554 26417e 97554->97468 97557 289ed4 89 API calls 97557->97559 97559->97544 97559->97546 97559->97548 97559->97550 97559->97557 97561 22ebd8 97559->97561 97604 2280d7 59 API calls 2 library calls 97559->97604 97607 2771e5 59 API calls 97559->97607 97608 29c6d7 341 API calls 97559->97608 97609 29b651 341 API calls Mailbox 97559->97609 97611 229df0 59 API calls Mailbox 97559->97611 97612 2994db 341 API calls Mailbox 97559->97612 97561->97468 97563 22f7b0 97562->97563 97564 22f61a 97562->97564 97565 227f41 59 API calls 97563->97565 97566 264777 97564->97566 97567 22f626 97564->97567 97573 22f6ec Mailbox 97565->97573 97710 29bd80 341 API calls Mailbox 97566->97710 97708 22f3f0 341 API calls 2 library calls 97567->97708 97570 264785 97574 22f790 97570->97574 97711 289ed4 89 API calls 4 library calls 97570->97711 97572 22f65d 97572->97570 97572->97573 97572->97574 97613 29e04b 97573->97613 97616 29e037 97573->97616 97619 28cc06 97573->97619 97699 224faa 97573->97699 97705 283c7b 97573->97705 97574->97468 97576 22f743 97576->97574 97709 229df0 59 API calls Mailbox 97576->97709 97582->97468 97583->97398 97584->97403 97585->97468 97586->97405 97587->97405 97588->97405 97589->97468 97590->97468 97591->97468 97592->97468 97593->97468 97594->97468 97595->97453 97596->97453 97597->97453 97598->97453 97599->97453 97600->97453 97601->97453 97602->97529 97603->97530 97604->97559 97605->97559 97606->97559 97607->97559 97608->97559 97609->97559 97610->97554 97611->97559 97612->97559 97712 29cbf1 97613->97712 97615 29e05b 97615->97576 97617 29cbf1 130 API calls 97616->97617 97618 29e047 97617->97618 97618->97576 97620 2277c7 59 API calls 97619->97620 97621 28cc3b 97620->97621 97622 2277c7 59 API calls 97621->97622 97623 28cc44 97622->97623 97624 28cc58 97623->97624 98024 229c9c 59 API calls 97623->98024 97626 229997 84 API calls 97624->97626 97627 28cc75 97626->97627 97628 28cd76 97627->97628 97629 28cc97 97627->97629 97698 28cda6 Mailbox 97627->97698 97837 224f3d 97628->97837 97630 229997 84 API calls 97629->97630 97632 28cca3 97630->97632 97634 2281a7 59 API calls 97632->97634 97636 28ccaf 97634->97636 97635 28cda2 97638 2277c7 59 API calls 97635->97638 97635->97698 97642 28ccc3 97636->97642 97643 28ccf5 97636->97643 97637 224f3d 136 API calls 97637->97635 97639 28cdd7 97638->97639 97640 2277c7 59 API calls 97639->97640 97641 28cde0 97640->97641 97645 2277c7 59 API calls 97641->97645 97646 2281a7 59 API calls 97642->97646 97644 229997 84 API calls 97643->97644 97647 28cd02 97644->97647 97648 28cde9 97645->97648 97649 28ccd3 97646->97649 97650 2281a7 59 API calls 97647->97650 97651 2277c7 59 API calls 97648->97651 97652 227e0b 59 API calls 97649->97652 97653 28cd0e 97650->97653 97654 28cdf2 97651->97654 97655 28ccdd 97652->97655 98025 284ad8 GetFileAttributesW 97653->98025 97657 229997 84 API calls 97654->97657 97658 229997 84 API calls 97655->97658 97660 28cdff 97657->97660 97661 28cce9 97658->97661 97659 28cd17 97662 28cd2a 97659->97662 97665 227b52 59 API calls 97659->97665 97861 2246f9 97660->97861 97664 227c8e 59 API calls 97661->97664 97667 229997 84 API calls 97662->97667 97672 28cd30 97662->97672 97664->97643 97665->97662 97666 28ce1a 97912 227b52 97666->97912 97669 28cd57 97667->97669 98026 283833 75 API calls Mailbox 97669->98026 97672->97698 97673 28ce5d 97674 2281a7 59 API calls 97673->97674 97676 28ce6b 97674->97676 97675 227b52 59 API calls 97677 28ce3a 97675->97677 97678 227c8e 59 API calls 97676->97678 97677->97673 97679 227d2c 59 API calls 97677->97679 97680 28ce79 97678->97680 97681 28ce4f 97679->97681 97682 227c8e 59 API calls 97680->97682 97683 227d2c 59 API calls 97681->97683 97684 28ce87 97682->97684 97683->97673 97685 227c8e 59 API calls 97684->97685 97686 28ce95 97685->97686 97687 229997 84 API calls 97686->97687 97688 28cea1 97687->97688 97915 2840b2 97688->97915 97690 28ceb2 97691 283c7b 3 API calls 97690->97691 97692 28cebc 97691->97692 97693 229997 84 API calls 97692->97693 97697 28ceed 97692->97697 97694 28ceda 97693->97694 97969 2891fe 97694->97969 97696 224faa 84 API calls 97696->97698 97697->97696 97698->97576 97700 224fb4 97699->97700 97702 224fbb 97699->97702 97701 245516 __fcloseall 83 API calls 97700->97701 97701->97702 97703 224fca 97702->97703 97704 224fdb FreeLibrary 97702->97704 97703->97576 97704->97703 98727 28449b GetFileAttributesW 97705->98727 97708->97572 97709->97576 97710->97570 97711->97574 97713 229997 84 API calls 97712->97713 97714 29cc2e 97713->97714 97733 29cc75 Mailbox 97714->97733 97750 29d8b9 97714->97750 97716 29cecd 97717 29d042 97716->97717 97721 29cedb 97716->97721 97800 29d9dc 92 API calls Mailbox 97717->97800 97720 29d051 97720->97721 97723 29d05d 97720->97723 97763 29ca82 97721->97763 97722 229997 84 API calls 97741 29ccc6 Mailbox 97722->97741 97723->97733 97728 29cf14 97778 240d88 97728->97778 97731 29cf2e 97784 289ed4 89 API calls 4 library calls 97731->97784 97732 29cf47 97785 22942e 97732->97785 97733->97615 97736 29cf39 GetCurrentProcess TerminateProcess 97736->97732 97741->97716 97741->97722 97741->97733 97782 28f656 59 API calls 2 library calls 97741->97782 97783 29d0f3 61 API calls 2 library calls 97741->97783 97742 29d0b8 97742->97733 97746 29d0cc FreeLibrary 97742->97746 97743 29cf7f 97797 29d75d 107 API calls _free 97743->97797 97746->97733 97749 29cf90 97749->97742 97798 228ea0 59 API calls Mailbox 97749->97798 97799 229e9c 60 API calls Mailbox 97749->97799 97801 29d75d 107 API calls _free 97749->97801 97751 227faf 59 API calls 97750->97751 97752 29d8d4 CharLowerBuffW 97751->97752 97802 27f479 97752->97802 97756 2277c7 59 API calls 97757 29d90d 97756->97757 97809 2279ab 97757->97809 97759 29d924 97761 227e8c 59 API calls 97759->97761 97760 29d96c Mailbox 97760->97741 97762 29d930 Mailbox 97761->97762 97762->97760 97822 29d0f3 61 API calls 2 library calls 97762->97822 97764 29ca9d 97763->97764 97768 29caf2 97763->97768 97765 240f36 Mailbox 59 API calls 97764->97765 97767 29cabf 97765->97767 97766 240f36 Mailbox 59 API calls 97766->97767 97767->97766 97767->97768 97769 29db64 97768->97769 97770 29dd8d Mailbox 97769->97770 97777 29db87 _strcat _wcscpy __NMSG_WRITE 97769->97777 97770->97728 97771 229d46 59 API calls 97771->97777 97772 229c9c 59 API calls 97772->97777 97773 229cf8 59 API calls 97773->97777 97774 24588c 58 API calls __crtGetStringTypeA_stat 97774->97777 97775 229997 84 API calls 97775->97777 97777->97770 97777->97771 97777->97772 97777->97773 97777->97774 97777->97775 97826 28592e 61 API calls 2 library calls 97777->97826 97780 240d9d 97778->97780 97779 240e35 VirtualProtect 97781 240e03 97779->97781 97780->97779 97780->97781 97781->97731 97781->97732 97782->97741 97783->97741 97784->97736 97786 229436 97785->97786 97787 240f36 Mailbox 59 API calls 97786->97787 97788 229444 97787->97788 97789 229450 97788->97789 97827 22935c 59 API calls Mailbox 97788->97827 97791 2291b0 97789->97791 97828 2292c0 97791->97828 97793 2291bf 97794 240f36 Mailbox 59 API calls 97793->97794 97795 22925b 97793->97795 97794->97795 97795->97749 97796 228ea0 59 API calls Mailbox 97795->97796 97796->97743 97797->97749 97798->97749 97799->97749 97800->97720 97801->97749 97804 27f4a4 __NMSG_WRITE 97802->97804 97803 27f4e3 97803->97756 97803->97762 97804->97803 97805 27f4d9 97804->97805 97806 27f58a 97804->97806 97805->97803 97823 227a24 61 API calls 97805->97823 97806->97803 97824 227a24 61 API calls 97806->97824 97810 227a17 97809->97810 97811 2279ba 97809->97811 97812 227e8c 59 API calls 97810->97812 97811->97810 97813 2279c5 97811->97813 97819 2279e8 _memmove 97812->97819 97814 2279e0 97813->97814 97815 25ee62 97813->97815 97825 228087 59 API calls Mailbox 97814->97825 97816 228189 59 API calls 97815->97816 97818 25ee6c 97816->97818 97820 240f36 Mailbox 59 API calls 97818->97820 97819->97759 97821 25ee8c 97820->97821 97822->97760 97823->97805 97824->97806 97825->97819 97826->97777 97827->97789 97829 2292c9 Mailbox 97828->97829 97830 25f4f8 97829->97830 97835 2292d3 97829->97835 97832 240f36 Mailbox 59 API calls 97830->97832 97831 2292da 97831->97793 97833 25f504 97832->97833 97835->97831 97836 229df0 59 API calls Mailbox 97835->97836 97836->97835 98027 224d13 97837->98027 97842 25dc3f 97844 224faa 84 API calls 97842->97844 97843 224f68 LoadLibraryExW 98037 224cc8 97843->98037 97846 25dc46 97844->97846 97848 224cc8 3 API calls 97846->97848 97850 25dc4e 97848->97850 98063 22506b 97850->98063 97851 224f8f 97851->97850 97852 224f9b 97851->97852 97854 224faa 84 API calls 97852->97854 97856 224fa0 97854->97856 97856->97635 97856->97637 97858 25dc75 98071 225027 97858->98071 97862 2277c7 59 API calls 97861->97862 97863 22470f 97862->97863 97864 2277c7 59 API calls 97863->97864 97865 224717 97864->97865 97866 2277c7 59 API calls 97865->97866 97867 22471f 97866->97867 97868 2277c7 59 API calls 97867->97868 97869 224727 97868->97869 97870 22475b 97869->97870 97871 25d82b 97869->97871 97872 2279ab 59 API calls 97870->97872 97873 2281a7 59 API calls 97871->97873 97874 224769 97872->97874 97875 25d834 97873->97875 97876 227e8c 59 API calls 97874->97876 97877 227eec 59 API calls 97875->97877 97878 224773 97876->97878 97880 22479e 97877->97880 97879 2279ab 59 API calls 97878->97879 97878->97880 97883 224794 97879->97883 97881 2247de 97880->97881 97884 2247bd 97880->97884 97894 25d854 97880->97894 97882 2279ab 59 API calls 97881->97882 97885 2247ef 97882->97885 97886 227e8c 59 API calls 97883->97886 97888 227b52 59 API calls 97884->97888 97889 224801 97885->97889 97892 2281a7 59 API calls 97885->97892 97886->97880 97887 25d924 97890 227d2c 59 API calls 97887->97890 97891 2247c7 97888->97891 97893 224811 97889->97893 97895 2281a7 59 API calls 97889->97895 97907 25d8e1 97890->97907 97891->97881 97898 2279ab 59 API calls 97891->97898 97892->97889 97897 224818 97893->97897 97899 2281a7 59 API calls 97893->97899 97894->97887 97896 25d90d 97894->97896 97905 25d88b 97894->97905 97895->97893 97896->97887 97901 25d8f8 97896->97901 97900 2281a7 59 API calls 97897->97900 97909 22481f Mailbox 97897->97909 97898->97881 97899->97897 97900->97909 97904 227d2c 59 API calls 97901->97904 97902 25d8e9 97903 227d2c 59 API calls 97902->97903 97903->97907 97904->97907 97905->97902 97910 25d8d4 97905->97910 97906 227b52 59 API calls 97906->97907 97907->97881 97907->97906 98358 227a84 59 API calls 2 library calls 97907->98358 97909->97666 97911 227d2c 59 API calls 97910->97911 97911->97907 97913 227faf 59 API calls 97912->97913 97914 227b5d 97913->97914 97914->97673 97914->97675 97916 2840ce 97915->97916 97917 2840e1 97916->97917 97918 2840d3 97916->97918 97920 2277c7 59 API calls 97917->97920 97919 2281a7 59 API calls 97918->97919 97921 2840dc Mailbox 97919->97921 97922 2840e9 97920->97922 97921->97690 97923 2277c7 59 API calls 97922->97923 97924 2840f1 97923->97924 97925 2277c7 59 API calls 97924->97925 97926 2840fc 97925->97926 97927 2277c7 59 API calls 97926->97927 97928 284104 97927->97928 97929 2277c7 59 API calls 97928->97929 97930 28410c 97929->97930 97931 2277c7 59 API calls 97930->97931 97932 284114 97931->97932 97933 2277c7 59 API calls 97932->97933 97934 28411c 97933->97934 97935 2277c7 59 API calls 97934->97935 97936 284124 97935->97936 97937 2246f9 59 API calls 97936->97937 97938 28413b 97937->97938 97939 2246f9 59 API calls 97938->97939 97940 284154 97939->97940 97941 227b52 59 API calls 97940->97941 97942 284160 97941->97942 97943 284173 97942->97943 97944 227e8c 59 API calls 97942->97944 97945 227b52 59 API calls 97943->97945 97944->97943 97946 28417c 97945->97946 97947 28418c 97946->97947 97949 227e8c 59 API calls 97946->97949 97948 2281a7 59 API calls 97947->97948 97950 284198 97948->97950 97949->97947 97951 227c8e 59 API calls 97950->97951 97952 2841a4 97951->97952 98359 284264 59 API calls 97952->98359 97954 2841b3 98360 284264 59 API calls 97954->98360 97956 2841c6 97957 227b52 59 API calls 97956->97957 97958 2841d0 97957->97958 97959 2841d5 97958->97959 97960 2841e7 97958->97960 97961 227e0b 59 API calls 97959->97961 97962 227b52 59 API calls 97960->97962 97964 2841e2 97961->97964 97963 2841f0 97962->97963 97965 28420e 97963->97965 97966 227e0b 59 API calls 97963->97966 97967 227c8e 59 API calls 97964->97967 97968 227c8e 59 API calls 97965->97968 97966->97964 97967->97965 97968->97921 97970 28920b __write_nolock 97969->97970 97971 240f36 Mailbox 59 API calls 97970->97971 97972 289268 97971->97972 97973 22538e 59 API calls 97972->97973 97974 289272 97973->97974 97975 289008 GetSystemTimeAsFileTime 97974->97975 97976 28927d 97975->97976 97977 225045 85 API calls 97976->97977 97978 289290 _wcscmp 97977->97978 97979 289361 97978->97979 97980 2892b4 97978->97980 97981 2897dd 96 API calls 97979->97981 98391 2897dd 97980->98391 97997 28932d _wcscat 97981->97997 97985 22506b 74 API calls 97986 289386 97985->97986 97988 22506b 74 API calls 97986->97988 97987 28936a 97987->97697 97990 289396 97988->97990 97989 2892e2 _wcscat _wcscpy 98398 24426e 58 API calls __wsplitpath_helper 97989->98398 97991 22506b 74 API calls 97990->97991 97993 2893b1 97991->97993 97994 22506b 74 API calls 97993->97994 97995 2893c1 97994->97995 97996 22506b 74 API calls 97995->97996 97998 2893dc 97996->97998 97997->97985 97997->97987 97999 22506b 74 API calls 97998->97999 98000 2893ec 97999->98000 98001 22506b 74 API calls 98000->98001 98002 2893fc 98001->98002 98003 22506b 74 API calls 98002->98003 98004 28940c 98003->98004 98361 28998c GetTempPathW GetTempFileNameW 98004->98361 98006 289418 98007 2453cb 115 API calls 98006->98007 98017 289429 98007->98017 98008 2894e3 98375 245516 98008->98375 98010 2894ee 98012 289508 98010->98012 98013 2894f4 DeleteFileW 98010->98013 98011 22506b 74 API calls 98011->98017 98014 2895ae CopyFileW 98012->98014 98019 289512 _wcsncpy 98012->98019 98013->97987 98015 2895c4 DeleteFileW 98014->98015 98016 2895d6 DeleteFileW 98014->98016 98015->97987 98388 28994b CreateFileW 98016->98388 98017->97987 98017->98008 98017->98011 98362 2449d3 98017->98362 98399 288baf 98019->98399 98023 28959d DeleteFileW 98023->97987 98024->97624 98025->97659 98026->97672 98076 224d61 98027->98076 98030 224d53 98034 2453cb 98030->98034 98031 224d4a FreeLibrary 98031->98030 98032 224d61 2 API calls 98033 224d3a 98032->98033 98033->98030 98033->98031 98080 2453e0 98034->98080 98036 224f5c 98036->97842 98036->97843 98161 224d94 98037->98161 98040 224ced 98042 224d08 98040->98042 98043 224cff FreeLibrary 98040->98043 98041 224d94 2 API calls 98041->98040 98044 224dd0 98042->98044 98043->98042 98045 240f36 Mailbox 59 API calls 98044->98045 98046 224de5 98045->98046 98165 22538e 98046->98165 98048 224df1 _memmove 98049 224e2c 98048->98049 98051 224f21 98048->98051 98052 224ee9 98048->98052 98050 225027 69 API calls 98049->98050 98062 224e35 98050->98062 98179 2899c4 95 API calls 98051->98179 98168 224fe9 CreateStreamOnHGlobal 98052->98168 98055 22506b 74 API calls 98055->98062 98057 224ec9 98057->97851 98058 25dc00 98059 225045 85 API calls 98058->98059 98060 25dc14 98059->98060 98061 22506b 74 API calls 98060->98061 98061->98057 98062->98055 98062->98057 98062->98058 98174 225045 98062->98174 98064 25dd26 98063->98064 98065 22507d 98063->98065 98203 245752 98065->98203 98068 2891b2 98335 289008 98068->98335 98070 2891c8 98070->97858 98072 225036 98071->98072 98073 25dce9 98071->98073 98340 245dd0 98072->98340 98075 22503e 98077 224d2e 98076->98077 98078 224d6a LoadLibraryA 98076->98078 98077->98032 98077->98033 98078->98077 98079 224d7b GetProcAddress 98078->98079 98079->98077 98083 2453ec __ioinit 98080->98083 98081 2453ff 98129 248ca8 58 API calls __getptd_noexit 98081->98129 98083->98081 98085 245430 98083->98085 98084 245404 98130 248f36 9 API calls __write 98084->98130 98099 250668 98085->98099 98088 245435 98089 24543e 98088->98089 98090 24544b 98088->98090 98131 248ca8 58 API calls __getptd_noexit 98089->98131 98091 245475 98090->98091 98092 245455 98090->98092 98114 250787 98091->98114 98132 248ca8 58 API calls __getptd_noexit 98092->98132 98096 24540f __ioinit @_EH4_CallFilterFunc@8 98096->98036 98100 250674 __ioinit 98099->98100 98101 249d8b __lock 58 API calls 98100->98101 98112 250682 98101->98112 98102 2506f6 98134 25077e 98102->98134 98103 2506fd 98139 24899d 58 API calls 2 library calls 98103->98139 98106 250704 98106->98102 98140 249fab InitializeCriticalSectionAndSpinCount 98106->98140 98107 250773 __ioinit 98107->98088 98109 249e13 __mtinitlocknum 58 API calls 98109->98112 98111 25072a EnterCriticalSection 98111->98102 98112->98102 98112->98103 98112->98109 98137 246dcd 59 API calls __lock 98112->98137 98138 246e37 LeaveCriticalSection LeaveCriticalSection _doexit 98112->98138 98115 2507a7 __wopenfile 98114->98115 98116 2507c1 98115->98116 98125 25097c 98115->98125 98147 24394b 60 API calls 2 library calls 98115->98147 98145 248ca8 58 API calls __getptd_noexit 98116->98145 98118 2507c6 98146 248f36 9 API calls __write 98118->98146 98120 245480 98133 2454a2 LeaveCriticalSection LeaveCriticalSection _fseek 98120->98133 98121 2509df 98142 258721 98121->98142 98124 250975 98124->98125 98148 24394b 60 API calls 2 library calls 98124->98148 98125->98116 98125->98121 98127 250994 98127->98125 98149 24394b 60 API calls 2 library calls 98127->98149 98129->98084 98130->98096 98131->98096 98132->98096 98133->98096 98141 249ef5 LeaveCriticalSection 98134->98141 98136 250785 98136->98107 98137->98112 98138->98112 98139->98106 98140->98111 98141->98136 98150 257f05 98142->98150 98144 25873a 98144->98120 98145->98118 98146->98120 98147->98124 98148->98127 98149->98125 98151 257f11 __ioinit 98150->98151 98152 257f27 98151->98152 98155 257f5d 98151->98155 98153 248ca8 __write 58 API calls 98152->98153 98154 257f2c 98153->98154 98157 248f36 __write 9 API calls 98154->98157 98156 257fce __wsopen_nolock 109 API calls 98155->98156 98158 257f79 98156->98158 98160 257f36 __ioinit 98157->98160 98159 257fa2 __wsopen_helper LeaveCriticalSection 98158->98159 98159->98160 98160->98144 98162 224ce1 98161->98162 98163 224d9d LoadLibraryA 98161->98163 98162->98040 98162->98041 98163->98162 98164 224dae GetProcAddress 98163->98164 98164->98162 98166 240f36 Mailbox 59 API calls 98165->98166 98167 2253a0 98166->98167 98167->98048 98169 225003 FindResourceExW 98168->98169 98173 225020 98168->98173 98170 25dc8c LoadResource 98169->98170 98169->98173 98171 25dca1 SizeofResource 98170->98171 98170->98173 98172 25dcb5 LockResource 98171->98172 98171->98173 98172->98173 98173->98049 98175 25dd04 98174->98175 98176 225054 98174->98176 98180 2459bd 98176->98180 98178 225062 98178->98062 98179->98049 98183 2459c9 __ioinit 98180->98183 98181 2459db 98193 248ca8 58 API calls __getptd_noexit 98181->98193 98183->98181 98184 245a01 98183->98184 98195 246d8e 98184->98195 98185 2459e0 98194 248f36 9 API calls __write 98185->98194 98190 245a16 98202 245a38 LeaveCriticalSection LeaveCriticalSection _fseek 98190->98202 98192 2459eb __ioinit 98192->98178 98193->98185 98194->98192 98196 246dc0 EnterCriticalSection 98195->98196 98197 246d9e 98195->98197 98199 245a07 98196->98199 98197->98196 98198 246da6 98197->98198 98200 249d8b __lock 58 API calls 98198->98200 98201 24592e 83 API calls 4 library calls 98199->98201 98200->98199 98201->98190 98202->98192 98206 24576d 98203->98206 98205 22508e 98205->98068 98207 245779 __ioinit 98206->98207 98208 2457b4 __ioinit 98207->98208 98209 2457bc 98207->98209 98210 24578f _memset 98207->98210 98208->98205 98211 246d8e __lock_file 59 API calls 98209->98211 98233 248ca8 58 API calls __getptd_noexit 98210->98233 98213 2457c2 98211->98213 98219 24558d 98213->98219 98214 2457a9 98234 248f36 9 API calls __write 98214->98234 98223 2455a8 _memset 98219->98223 98226 2455c3 98219->98226 98220 2455b3 98331 248ca8 58 API calls __getptd_noexit 98220->98331 98222 2455b8 98332 248f36 9 API calls __write 98222->98332 98223->98220 98223->98226 98231 245603 98223->98231 98235 2457f6 LeaveCriticalSection LeaveCriticalSection _fseek 98226->98235 98227 245714 _memset 98334 248ca8 58 API calls __getptd_noexit 98227->98334 98231->98226 98231->98227 98236 244856 98231->98236 98243 250fdb 98231->98243 98311 250d27 98231->98311 98333 250e48 58 API calls 3 library calls 98231->98333 98233->98214 98234->98208 98235->98208 98237 244875 98236->98237 98238 244860 98236->98238 98237->98231 98239 248ca8 __write 58 API calls 98238->98239 98240 244865 98239->98240 98241 248f36 __write 9 API calls 98240->98241 98242 244870 98241->98242 98242->98231 98244 251013 98243->98244 98245 250ffc 98243->98245 98246 25174b 98244->98246 98251 25104d 98244->98251 98247 248c74 __write 58 API calls 98245->98247 98249 248c74 __write 58 API calls 98246->98249 98248 251001 98247->98248 98250 248ca8 __write 58 API calls 98248->98250 98252 251750 98249->98252 98291 251008 98250->98291 98253 251055 98251->98253 98259 25106c 98251->98259 98254 248ca8 __write 58 API calls 98252->98254 98255 248c74 __write 58 API calls 98253->98255 98256 251061 98254->98256 98257 25105a 98255->98257 98260 248f36 __write 9 API calls 98256->98260 98263 248ca8 __write 58 API calls 98257->98263 98258 251081 98261 248c74 __write 58 API calls 98258->98261 98259->98258 98262 25109b 98259->98262 98264 2510b9 98259->98264 98259->98291 98260->98291 98261->98257 98262->98258 98267 2510a6 98262->98267 98263->98256 98265 24899d __malloc_crt 58 API calls 98264->98265 98268 2510c9 98265->98268 98266 255deb __write_nolock 58 API calls 98269 2511ba 98266->98269 98267->98266 98270 2510d1 98268->98270 98271 2510ec 98268->98271 98272 251233 ReadFile 98269->98272 98278 2511d0 GetConsoleMode 98269->98278 98274 248ca8 __write 58 API calls 98270->98274 98273 251a41 __lseeki64_nolock 60 API calls 98271->98273 98275 251255 98272->98275 98276 251713 GetLastError 98272->98276 98273->98267 98277 2510d6 98274->98277 98275->98276 98284 251225 98275->98284 98279 251213 98276->98279 98280 251720 98276->98280 98281 248c74 __write 58 API calls 98277->98281 98282 2511e4 98278->98282 98283 251230 98278->98283 98289 248c87 __dosmaperr 58 API calls 98279->98289 98293 251219 98279->98293 98285 248ca8 __write 58 API calls 98280->98285 98281->98291 98282->98283 98286 2511ea ReadConsoleW 98282->98286 98283->98272 98284->98293 98294 2514f7 98284->98294 98296 25128a 98284->98296 98287 251725 98285->98287 98286->98284 98288 25120d GetLastError 98286->98288 98290 248c74 __write 58 API calls 98287->98290 98288->98279 98289->98293 98290->98293 98291->98231 98292 242ed5 _free 58 API calls 98292->98291 98293->98291 98293->98292 98294->98293 98299 2515fd ReadFile 98294->98299 98295 251377 98295->98293 98301 251424 98295->98301 98304 251434 98295->98304 98307 2513e4 MultiByteToWideChar 98295->98307 98296->98295 98298 2512f6 ReadFile 98296->98298 98300 251317 GetLastError 98298->98300 98309 251321 98298->98309 98303 251620 GetLastError 98299->98303 98308 25162e 98299->98308 98300->98309 98302 248ca8 __write 58 API calls 98301->98302 98302->98293 98303->98308 98305 251a41 __lseeki64_nolock 60 API calls 98304->98305 98304->98307 98305->98307 98306 251a41 __lseeki64_nolock 60 API calls 98306->98309 98307->98288 98307->98293 98308->98294 98310 251a41 __lseeki64_nolock 60 API calls 98308->98310 98309->98296 98309->98306 98310->98308 98312 250d32 98311->98312 98316 250d47 98311->98316 98313 248ca8 __write 58 API calls 98312->98313 98314 250d37 98313->98314 98315 248f36 __write 9 API calls 98314->98315 98322 250d42 98315->98322 98317 250d7c 98316->98317 98318 256164 __getbuf 58 API calls 98316->98318 98316->98322 98319 244856 __fputwc_nolock 58 API calls 98317->98319 98318->98317 98320 250d90 98319->98320 98321 250ec7 __read 72 API calls 98320->98321 98323 250d97 98321->98323 98322->98231 98323->98322 98324 244856 __fputwc_nolock 58 API calls 98323->98324 98325 250dba 98324->98325 98325->98322 98326 244856 __fputwc_nolock 58 API calls 98325->98326 98327 250dc6 98326->98327 98327->98322 98328 244856 __fputwc_nolock 58 API calls 98327->98328 98329 250dd3 98328->98329 98330 244856 __fputwc_nolock 58 API calls 98329->98330 98330->98322 98331->98222 98332->98226 98333->98231 98334->98222 98338 24537a GetSystemTimeAsFileTime 98335->98338 98337 289017 98337->98070 98339 2453a8 __aulldiv 98338->98339 98339->98337 98341 245ddc __ioinit 98340->98341 98342 245e03 98341->98342 98343 245dee 98341->98343 98345 246d8e __lock_file 59 API calls 98342->98345 98354 248ca8 58 API calls __getptd_noexit 98343->98354 98347 245e09 98345->98347 98346 245df3 98355 248f36 9 API calls __write 98346->98355 98356 245a40 67 API calls 5 library calls 98347->98356 98350 245e14 98357 245e34 LeaveCriticalSection LeaveCriticalSection _fseek 98350->98357 98352 245e26 98353 245dfe __ioinit 98352->98353 98353->98075 98354->98346 98355->98353 98356->98350 98357->98352 98358->97907 98359->97954 98360->97956 98361->98006 98363 2449df __ioinit 98362->98363 98364 244a15 98363->98364 98365 2449fd 98363->98365 98367 244a0d __ioinit 98363->98367 98368 246d8e __lock_file 59 API calls 98364->98368 98442 248ca8 58 API calls __getptd_noexit 98365->98442 98367->98017 98370 244a1b 98368->98370 98369 244a02 98443 248f36 9 API calls __write 98369->98443 98430 24487a 98370->98430 98376 245522 __ioinit 98375->98376 98377 245536 98376->98377 98378 24554e 98376->98378 98612 248ca8 58 API calls __getptd_noexit 98377->98612 98381 246d8e __lock_file 59 API calls 98378->98381 98384 245546 __ioinit 98378->98384 98380 24553b 98613 248f36 9 API calls __write 98380->98613 98383 245560 98381->98383 98596 2454aa 98383->98596 98384->98010 98389 289971 SetFileTime CloseHandle 98388->98389 98390 289987 98388->98390 98389->98390 98390->97987 98396 2897f1 __tzset_nolock _wcscmp 98391->98396 98392 22506b 74 API calls 98392->98396 98393 2892b9 98393->97987 98397 24426e 58 API calls __wsplitpath_helper 98393->98397 98394 2891b2 GetSystemTimeAsFileTime 98394->98396 98395 225045 85 API calls 98395->98396 98396->98392 98396->98393 98396->98394 98396->98395 98397->97989 98398->97997 98400 288bc8 98399->98400 98401 288bba 98399->98401 98403 288c0d 98400->98403 98404 2453cb 115 API calls 98400->98404 98414 288bd1 98400->98414 98402 2453cb 115 API calls 98401->98402 98402->98400 98685 288e3a 98403->98685 98405 288bf2 98404->98405 98405->98403 98407 288bfb 98405->98407 98411 245516 __fcloseall 83 API calls 98407->98411 98407->98414 98408 288c51 98409 288c55 98408->98409 98410 288c76 98408->98410 98413 288c62 98409->98413 98416 245516 __fcloseall 83 API calls 98409->98416 98689 288a52 98410->98689 98411->98414 98413->98414 98417 245516 __fcloseall 83 API calls 98413->98417 98414->98016 98414->98023 98416->98413 98417->98414 98433 244889 98430->98433 98436 2448a7 98430->98436 98431 244897 98473 248ca8 58 API calls __getptd_noexit 98431->98473 98433->98431 98433->98436 98439 2448c1 _memmove 98433->98439 98434 24489c 98474 248f36 9 API calls __write 98434->98474 98444 244a4d LeaveCriticalSection LeaveCriticalSection _fseek 98436->98444 98439->98436 98440 244856 __fputwc_nolock 58 API calls 98439->98440 98445 24da06 98439->98445 98475 244bad 98439->98475 98481 24af9e 78 API calls 6 library calls 98439->98481 98440->98439 98442->98369 98443->98367 98444->98367 98446 24da12 __ioinit 98445->98446 98447 24da36 98446->98447 98448 24da1f 98446->98448 98449 24dad5 98447->98449 98451 24da4a 98447->98451 98555 248c74 58 API calls __getptd_noexit 98448->98555 98561 248c74 58 API calls __getptd_noexit 98449->98561 98455 24da72 98451->98455 98456 24da68 98451->98456 98453 24da24 98556 248ca8 58 API calls __getptd_noexit 98453->98556 98482 24d386 98455->98482 98557 248c74 58 API calls __getptd_noexit 98456->98557 98457 24da6d 98562 248ca8 58 API calls __getptd_noexit 98457->98562 98464 24dae1 98563 248f36 9 API calls __write 98464->98563 98468 24da2b __ioinit 98468->98439 98473->98434 98474->98436 98476 244bc0 98475->98476 98480 244be4 98475->98480 98477 244856 __fputwc_nolock 58 API calls 98476->98477 98476->98480 98478 244bdd 98477->98478 98479 24da06 __write 78 API calls 98478->98479 98479->98480 98480->98439 98481->98439 98483 24d392 __ioinit 98482->98483 98484 24d3e1 EnterCriticalSection 98483->98484 98485 249d8b __lock 58 API calls 98483->98485 98486 24d407 __ioinit 98484->98486 98487 24d3b7 98485->98487 98555->98453 98556->98468 98557->98457 98561->98457 98562->98464 98563->98468 98597 2454cd 98596->98597 98598 2454b9 98596->98598 98600 2454c9 98597->98600 98602 244bad __flush 78 API calls 98597->98602 98645 248ca8 58 API calls __getptd_noexit 98598->98645 98614 245585 LeaveCriticalSection LeaveCriticalSection _fseek 98600->98614 98601 2454be 98646 248f36 9 API calls __write 98601->98646 98604 2454d9 98602->98604 98615 250cf7 98604->98615 98607 244856 __fputwc_nolock 58 API calls 98608 2454e7 98607->98608 98619 250b82 98608->98619 98612->98380 98613->98384 98614->98384 98616 2454e1 98615->98616 98617 250d04 98615->98617 98616->98607 98617->98616 98618 242ed5 _free 58 API calls 98617->98618 98618->98616 98620 250b8e __ioinit 98619->98620 98621 250bb2 98620->98621 98622 250b9b 98620->98622 98645->98601 98646->98600 98686 288e48 __tzset_nolock _memmove 98685->98686 98687 288e5f 98685->98687 98686->98408 98688 245752 __fread_nolock 74 API calls 98687->98688 98688->98686 98690 24588c __crtGetStringTypeA_stat 58 API calls 98689->98690 98728 283c82 98727->98728 98729 2844b6 FindFirstFileW 98727->98729 98728->97576 98729->98728 98730 2844cb FindClose 98729->98730 98730->98728 98731->97492 98732->97492 98733->97488 98734->97490 98735->97496 98736->97490 98737->97516 98738 221055 98743 222649 98738->98743 98741 242ec0 __cinit 67 API calls 98742 221064 98741->98742 98744 2277c7 59 API calls 98743->98744 98745 2226b7 98744->98745 98750 223582 98745->98750 98748 222754 98749 22105a 98748->98749 98753 223416 59 API calls 2 library calls 98748->98753 98749->98741 98754 2235b0 98750->98754 98753->98748 98755 2235a1 98754->98755 98756 2235bd 98754->98756 98755->98748 98756->98755 98757 2235c4 RegOpenKeyExW 98756->98757 98757->98755 98758 2235de RegQueryValueExW 98757->98758 98759 223614 RegCloseKey 98758->98759 98760 2235ff 98758->98760 98759->98755 98760->98759 98761 247dd3 98762 247ddf __ioinit 98761->98762 98798 249f88 GetStartupInfoW 98762->98798 98764 247de4 98800 248cfc GetProcessHeap 98764->98800 98766 247e3c 98767 247e47 98766->98767 98883 247f23 58 API calls 3 library calls 98766->98883 98801 249c66 98767->98801 98770 247e4d 98771 247e58 __RTC_Initialize 98770->98771 98884 247f23 58 API calls 3 library calls 98770->98884 98822 24d752 98771->98822 98774 247e67 98775 247e73 GetCommandLineW 98774->98775 98885 247f23 58 API calls 3 library calls 98774->98885 98841 2550a3 GetEnvironmentStringsW 98775->98841 98778 247e72 98778->98775 98781 247e8d 98782 247e98 98781->98782 98886 243235 58 API calls 3 library calls 98781->98886 98851 254ed8 98782->98851 98785 247e9e 98786 247ea9 98785->98786 98887 243235 58 API calls 3 library calls 98785->98887 98865 24326f 98786->98865 98789 247eb1 98790 247ebc __wwincmdln 98789->98790 98888 243235 58 API calls 3 library calls 98789->98888 98871 22492e 98790->98871 98793 247ed0 98794 247edf 98793->98794 98889 2434d8 58 API calls _doexit 98793->98889 98890 243260 58 API calls _doexit 98794->98890 98797 247ee4 __ioinit 98799 249f9e 98798->98799 98799->98764 98800->98766 98891 243307 36 API calls 2 library calls 98801->98891 98803 249c6b 98892 249ebc InitializeCriticalSectionAndSpinCount __ioinit 98803->98892 98805 249c74 98893 249cdc 61 API calls 2 library calls 98805->98893 98806 249c70 98806->98805 98894 249f0a TlsAlloc 98806->98894 98809 249c79 98809->98770 98810 249c86 98810->98805 98811 249c91 98810->98811 98895 248955 98811->98895 98814 249cd3 98903 249cdc 61 API calls 2 library calls 98814->98903 98817 249cb2 98817->98814 98819 249cb8 98817->98819 98818 249cd8 98818->98770 98902 249bb3 58 API calls 4 library calls 98819->98902 98821 249cc0 GetCurrentThreadId 98821->98770 98823 24d75e __ioinit 98822->98823 98824 249d8b __lock 58 API calls 98823->98824 98825 24d765 98824->98825 98826 248955 __calloc_crt 58 API calls 98825->98826 98827 24d776 98826->98827 98828 24d7e1 GetStartupInfoW 98827->98828 98829 24d781 __ioinit @_EH4_CallFilterFunc@8 98827->98829 98830 24d925 98828->98830 98832 24d7f6 98828->98832 98829->98774 98831 24d9ed 98830->98831 98835 24d972 GetStdHandle 98830->98835 98836 24d985 GetFileType 98830->98836 98916 249fab InitializeCriticalSectionAndSpinCount 98830->98916 98917 24d9fd LeaveCriticalSection _doexit 98831->98917 98832->98830 98834 248955 __calloc_crt 58 API calls 98832->98834 98840 24d844 98832->98840 98834->98832 98835->98830 98836->98830 98837 24d878 GetFileType 98837->98840 98840->98830 98840->98837 98915 249fab InitializeCriticalSectionAndSpinCount 98840->98915 98842 2550b4 98841->98842 98843 247e83 98841->98843 98918 24899d 58 API calls 2 library calls 98842->98918 98847 254c9b GetModuleFileNameW 98843->98847 98845 2550da _memmove 98846 2550f0 FreeEnvironmentStringsW 98845->98846 98846->98843 98848 254ccf _wparse_cmdline 98847->98848 98850 254d0f _wparse_cmdline 98848->98850 98919 24899d 58 API calls 2 library calls 98848->98919 98850->98781 98852 254ef1 __NMSG_WRITE 98851->98852 98853 254ee9 98851->98853 98854 248955 __calloc_crt 58 API calls 98852->98854 98853->98785 98855 254f1a __NMSG_WRITE 98854->98855 98855->98853 98857 254f71 98855->98857 98858 248955 __calloc_crt 58 API calls 98855->98858 98859 254f96 98855->98859 98862 254fad 98855->98862 98920 254787 58 API calls __write 98855->98920 98856 242ed5 _free 58 API calls 98856->98853 98857->98856 98858->98855 98860 242ed5 _free 58 API calls 98859->98860 98860->98853 98921 248f46 IsProcessorFeaturePresent 98862->98921 98864 254fb9 98864->98785 98866 24327b __IsNonwritableInCurrentImage 98865->98866 98936 24a651 98866->98936 98868 243299 __initterm_e 98869 242ec0 __cinit 67 API calls 98868->98869 98870 2432b8 _doexit __IsNonwritableInCurrentImage 98868->98870 98869->98870 98870->98789 98872 224948 98871->98872 98882 2249e7 98871->98882 98873 224982 IsThemeActive 98872->98873 98939 2434ec 98873->98939 98877 2249ae 98951 224a5b SystemParametersInfoW SystemParametersInfoW 98877->98951 98879 2249ba 98952 223b4c 98879->98952 98881 2249c2 SystemParametersInfoW 98881->98882 98882->98793 98883->98767 98884->98771 98885->98778 98889->98794 98890->98797 98891->98803 98892->98806 98893->98809 98894->98810 98898 24895c 98895->98898 98897 248997 98897->98814 98901 249f66 TlsSetValue 98897->98901 98898->98897 98900 24897a 98898->98900 98904 255376 98898->98904 98900->98897 98900->98898 98912 24a2b2 Sleep 98900->98912 98901->98817 98902->98821 98903->98818 98905 255381 98904->98905 98906 25539c 98904->98906 98905->98906 98907 25538d 98905->98907 98909 2553ac HeapAlloc 98906->98909 98910 255392 98906->98910 98914 243521 DecodePointer 98906->98914 98913 248ca8 58 API calls __getptd_noexit 98907->98913 98909->98906 98909->98910 98910->98898 98912->98900 98913->98910 98914->98906 98915->98840 98916->98830 98917->98829 98918->98845 98919->98850 98920->98855 98922 248f51 98921->98922 98927 248dd9 98922->98927 98926 248f6c 98926->98864 98928 248df3 _memset __call_reportfault 98927->98928 98929 248e13 IsDebuggerPresent 98928->98929 98935 24a2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 98929->98935 98931 24c776 __woutput_l 6 API calls 98932 248efa 98931->98932 98934 24a2c0 GetCurrentProcess TerminateProcess 98932->98934 98933 248ed7 __call_reportfault 98933->98931 98934->98926 98935->98933 98937 24a654 EncodePointer 98936->98937 98937->98937 98938 24a66e 98937->98938 98938->98868 98940 249d8b __lock 58 API calls 98939->98940 98941 2434f7 DecodePointer EncodePointer 98940->98941 99004 249ef5 LeaveCriticalSection 98941->99004 98943 2249a7 98944 243554 98943->98944 98945 24355e 98944->98945 98946 243578 98944->98946 98945->98946 99005 248ca8 58 API calls __getptd_noexit 98945->99005 98946->98877 98948 243568 99006 248f36 9 API calls __write 98948->99006 98950 243573 98950->98877 98951->98879 98953 223b59 __write_nolock 98952->98953 98954 2277c7 59 API calls 98953->98954 98955 223b63 GetCurrentDirectoryW 98954->98955 99007 223778 98955->99007 98957 223b8c IsDebuggerPresent 98958 25d3dd MessageBoxA 98957->98958 98959 223b9a 98957->98959 98961 25d3f7 98958->98961 98960 223c73 98959->98960 98959->98961 98962 223bb7 98959->98962 98963 223c7a SetCurrentDirectoryW 98960->98963 99129 227373 59 API calls Mailbox 98961->99129 99088 2273e5 98962->99088 98966 223c87 Mailbox 98963->98966 98966->98881 98967 25d407 98972 25d41d SetCurrentDirectoryW 98967->98972 98969 223bd5 GetFullPathNameW 98970 227d2c 59 API calls 98969->98970 98971 223c10 98970->98971 98972->98966 99004->98943 99005->98948 99006->98950 99008 2277c7 59 API calls 99007->99008 99009 22378e 99008->99009 99138 223d43 99009->99138 99011 2237ac 99012 224864 61 API calls 99011->99012 99013 2237c0 99012->99013 99014 227f41 59 API calls 99013->99014 99015 2237cd 99014->99015 99016 224f3d 136 API calls 99015->99016 99017 2237e6 99016->99017 99018 25d2de 99017->99018 99019 2237ee Mailbox 99017->99019 99180 289604 99018->99180 99022 2281a7 59 API calls 99019->99022 99025 223801 99022->99025 99023 224faa 84 API calls 99026 25d2fd 99023->99026 99024 242ed5 _free 58 API calls 99027 25d30a 99024->99027 99152 2293ea 99025->99152 99026->99024 99029 224faa 84 API calls 99027->99029 99031 25d313 99029->99031 99035 223ee2 59 API calls 99031->99035 99032 227f41 59 API calls 99033 22381a 99032->99033 99034 228620 69 API calls 99033->99034 99036 22382c Mailbox 99034->99036 99037 25d32e 99035->99037 99038 227f41 59 API calls 99036->99038 99039 223ee2 59 API calls 99037->99039 99040 223852 99038->99040 99041 25d34a 99039->99041 99042 228620 69 API calls 99040->99042 99043 224864 61 API calls 99041->99043 99045 223861 Mailbox 99042->99045 99044 25d36f 99043->99044 99046 223ee2 59 API calls 99044->99046 99048 2277c7 59 API calls 99045->99048 99047 25d37b 99046->99047 99049 2281a7 59 API calls 99047->99049 99050 22387f 99048->99050 99051 25d389 99049->99051 99155 223ee2 99050->99155 99053 223ee2 59 API calls 99051->99053 99056 25d398 99053->99056 99061 2281a7 59 API calls 99056->99061 99057 223899 99057->99031 99058 2238a3 99057->99058 99059 24307d _W_store_winword 60 API calls 99058->99059 99060 2238ae 99059->99060 99060->99037 99062 2238b8 99060->99062 99063 25d3ba 99061->99063 99064 24307d _W_store_winword 60 API calls 99062->99064 99065 223ee2 59 API calls 99063->99065 99066 2238c3 99064->99066 99067 25d3c7 99065->99067 99066->99041 99068 2238cd 99066->99068 99067->99067 99069 24307d _W_store_winword 60 API calls 99068->99069 99070 2238d8 99069->99070 99070->99056 99071 223919 99070->99071 99073 223ee2 59 API calls 99070->99073 99071->99056 99072 223926 99071->99072 99074 22942e 59 API calls 99072->99074 99075 2238fc 99073->99075 99076 223936 99074->99076 99077 2281a7 59 API calls 99075->99077 99079 2291b0 59 API calls 99076->99079 99078 22390a 99077->99078 99080 223ee2 59 API calls 99078->99080 99081 223944 99079->99081 99080->99071 99171 229040 99081->99171 99083 2293ea 59 API calls 99085 223961 99083->99085 99084 229040 60 API calls 99084->99085 99085->99083 99085->99084 99086 223ee2 59 API calls 99085->99086 99087 2239a7 Mailbox 99085->99087 99086->99085 99087->98957 99089 2273f2 __write_nolock 99088->99089 99090 22740b 99089->99090 99091 25ed7b _memset 99089->99091 99220 2248ae 99090->99220 99093 25ed97 GetOpenFileNameW 99091->99093 99096 25ede6 99093->99096 99098 227d2c 59 API calls 99096->99098 99100 25edfb 99098->99100 99100->99100 99101 227429 99248 2269ca 99101->99248 99129->98967 99139 223d50 __write_nolock 99138->99139 99140 227d2c 59 API calls 99139->99140 99145 223eb6 Mailbox 99139->99145 99142 223d82 99140->99142 99141 227b52 59 API calls 99141->99142 99142->99141 99151 223db8 Mailbox 99142->99151 99143 227b52 59 API calls 99143->99151 99144 223e89 99144->99145 99146 227f41 59 API calls 99144->99146 99145->99011 99148 223eaa 99146->99148 99147 227f41 59 API calls 99147->99151 99149 223f84 59 API calls 99148->99149 99149->99145 99150 223f84 59 API calls 99150->99151 99151->99143 99151->99144 99151->99145 99151->99147 99151->99150 99153 240f36 Mailbox 59 API calls 99152->99153 99154 22380d 99153->99154 99154->99032 99156 223f05 99155->99156 99157 223eec 99155->99157 99158 227d2c 59 API calls 99156->99158 99159 2281a7 59 API calls 99157->99159 99160 22388b 99158->99160 99159->99160 99161 24307d 99160->99161 99162 2430fe 99161->99162 99163 243089 99161->99163 99217 243110 60 API calls 3 library calls 99162->99217 99170 2430ae 99163->99170 99215 248ca8 58 API calls __getptd_noexit 99163->99215 99165 24310b 99165->99057 99167 243095 99216 248f36 9 API calls __write 99167->99216 99169 2430a0 99169->99057 99170->99057 99172 25f4d5 99171->99172 99175 229057 99171->99175 99172->99175 99219 228d3b 59 API calls Mailbox 99172->99219 99174 22915f 99174->99085 99175->99174 99176 2291a0 99175->99176 99177 229158 99175->99177 99218 229e9c 60 API calls Mailbox 99176->99218 99179 240f36 Mailbox 59 API calls 99177->99179 99179->99174 99181 225045 85 API calls 99180->99181 99182 289673 99181->99182 99183 2897dd 96 API calls 99182->99183 99184 289685 99183->99184 99185 22506b 74 API calls 99184->99185 99213 25d2f1 99184->99213 99186 2896a0 99185->99186 99187 22506b 74 API calls 99186->99187 99188 2896b0 99187->99188 99189 22506b 74 API calls 99188->99189 99190 2896cb 99189->99190 99191 22506b 74 API calls 99190->99191 99192 2896e6 99191->99192 99193 225045 85 API calls 99192->99193 99194 2896fd 99193->99194 99195 24588c __crtGetStringTypeA_stat 58 API calls 99194->99195 99196 289704 99195->99196 99197 24588c __crtGetStringTypeA_stat 58 API calls 99196->99197 99198 28970e 99197->99198 99199 22506b 74 API calls 99198->99199 99200 289722 99199->99200 99201 2891b2 GetSystemTimeAsFileTime 99200->99201 99202 289735 99201->99202 99203 28974a 99202->99203 99204 28975f 99202->99204 99205 242ed5 _free 58 API calls 99203->99205 99206 2897c4 99204->99206 99207 289765 99204->99207 99208 289750 99205->99208 99210 242ed5 _free 58 API calls 99206->99210 99209 288baf 116 API calls 99207->99209 99211 242ed5 _free 58 API calls 99208->99211 99212 2897bc 99209->99212 99210->99213 99211->99213 99214 242ed5 _free 58 API calls 99212->99214 99213->99023 99213->99026 99214->99213 99215->99167 99216->99169 99217->99165 99218->99174 99219->99175 99282 251ac0 99220->99282 99223 2248f7 99225 227eec 59 API calls 99223->99225 99224 2248da 99226 227d2c 59 API calls 99224->99226 99227 2248e6 99225->99227 99226->99227 99228 227886 59 API calls 99227->99228 99229 2248f2 99228->99229 99230 240911 99229->99230 99231 251ac0 __write_nolock 99230->99231 99232 24091e GetLongPathNameW 99231->99232 99233 227d2c 59 API calls 99232->99233 99234 22741d 99233->99234 99235 22716b 99234->99235 99236 2277c7 59 API calls 99235->99236 99237 22717d 99236->99237 99238 2248ae 60 API calls 99237->99238 99239 227188 99238->99239 99240 227193 99239->99240 99244 25ebde 99239->99244 99241 223f84 59 API calls 99240->99241 99243 22719f 99241->99243 99284 2234c2 99243->99284 99246 25ebf8 99244->99246 99290 227a68 61 API calls 99244->99290 99247 2271b2 Mailbox 99247->99101 99249 224f3d 136 API calls 99248->99249 99250 2269ef 99249->99250 99251 25e38a 99250->99251 99252 224f3d 136 API calls 99250->99252 99253 289604 122 API calls 99251->99253 99254 226a03 99252->99254 99255 25e39f 99253->99255 99254->99251 99256 226a0b 99254->99256 99257 25e3c0 99255->99257 99258 25e3a3 99255->99258 99260 226a17 99256->99260 99261 25e3ab 99256->99261 99259 240f36 Mailbox 59 API calls 99257->99259 99262 224faa 84 API calls 99258->99262 99278 25e405 Mailbox 99259->99278 99291 226bec 99260->99291 99392 284339 90 API calls _wprintf 99261->99392 99262->99261 99266 25e3b9 99266->99257 99267 25e5b9 99268 242ed5 _free 58 API calls 99267->99268 99269 25e5c1 99268->99269 99270 224faa 84 API calls 99269->99270 99275 25e5ca 99270->99275 99274 242ed5 _free 58 API calls 99274->99275 99275->99274 99276 224faa 84 API calls 99275->99276 99397 27fad2 89 API calls 4 library calls 99275->99397 99276->99275 99278->99267 99278->99275 99279 227f41 59 API calls 99278->99279 99384 22766f 99278->99384 99393 27fa6e 59 API calls 2 library calls 99278->99393 99394 27f98f 61 API calls 2 library calls 99278->99394 99395 287428 59 API calls Mailbox 99278->99395 99396 2274bd 59 API calls Mailbox 99278->99396 99279->99278 99283 2248bb GetFullPathNameW 99282->99283 99283->99223 99283->99224 99285 2234d4 99284->99285 99289 2234f3 _memmove 99284->99289 99287 240f36 Mailbox 59 API calls 99285->99287 99286 240f36 Mailbox 59 API calls 99288 22350a 99286->99288 99287->99289 99288->99247 99289->99286 99290->99244 99292 25e777 99291->99292 99293 226c15 99291->99293 99419 27fad2 89 API calls 4 library calls 99292->99419 99403 225906 60 API calls Mailbox 99293->99403 99296 226c37 99404 225956 67 API calls 99296->99404 99297 25e78a 99420 27fad2 89 API calls 4 library calls 99297->99420 99299 226c4c 99299->99297 99301 226c54 99299->99301 99303 2277c7 59 API calls 99301->99303 99302 25e7a6 99305 226cc1 99302->99305 99304 226c60 99303->99304 99405 240ad7 60 API calls __write_nolock 99304->99405 99307 25e7b9 99305->99307 99308 226ccf 99305->99308 99310 225dcf CloseHandle 99307->99310 99311 2277c7 59 API calls 99308->99311 99309 226c6c 99312 2277c7 59 API calls 99309->99312 99314 25e7c5 99310->99314 99315 226cd8 99311->99315 99313 226c78 99312->99313 99316 2248ae 60 API calls 99313->99316 99317 224f3d 136 API calls 99314->99317 99318 2277c7 59 API calls 99315->99318 99319 226c86 99316->99319 99320 25e7e1 99317->99320 99321 226ce1 99318->99321 99406 2259b0 ReadFile SetFilePointerEx 99319->99406 99323 25e80a 99320->99323 99326 289604 122 API calls 99320->99326 99324 2246f9 59 API calls 99321->99324 99421 27fad2 89 API calls 4 library calls 99323->99421 99327 226cf8 99324->99327 99325 226cb2 99407 225c4e SetFilePointerEx SetFilePointerEx 99325->99407 99331 25e7fd 99326->99331 99332 227c8e 59 API calls 99327->99332 99329 25e821 99339 226e6c Mailbox 99329->99339 99333 25e805 99331->99333 99334 25e826 99331->99334 99335 226d09 SetCurrentDirectoryW 99332->99335 99337 224faa 84 API calls 99333->99337 99336 224faa 84 API calls 99334->99336 99341 226d1c Mailbox 99335->99341 99338 25e82b 99336->99338 99337->99323 99340 240f36 Mailbox 59 API calls 99338->99340 99398 225934 99339->99398 99347 25e85f 99340->99347 99343 240f36 Mailbox 59 API calls 99341->99343 99345 226d2f 99343->99345 99344 223bcd 99344->98960 99344->98969 99346 22538e 59 API calls 99345->99346 99354 226d3a Mailbox __NMSG_WRITE 99346->99354 99348 22766f 59 API calls 99347->99348 99380 25e8a8 Mailbox 99348->99380 99349 226e47 99415 225dcf 99349->99415 99352 25ea99 99426 287388 59 API calls Mailbox 99352->99426 99353 226e53 SetCurrentDirectoryW 99353->99339 99354->99349 99367 25eb2a 99354->99367 99370 227f41 59 API calls 99354->99370 99371 25eb32 99354->99371 99408 2259cd 67 API calls _wcscpy 99354->99408 99409 2270bd GetStringTypeW 99354->99409 99410 22702c 60 API calls __wcsnicmp 99354->99410 99411 22710a GetStringTypeW __NMSG_WRITE 99354->99411 99412 2437bd GetStringTypeW _iswctype 99354->99412 99413 226a3c 165 API calls 3 library calls 99354->99413 99414 227373 59 API calls Mailbox 99354->99414 99357 25eabb 99427 28f656 59 API calls 2 library calls 99357->99427 99364 22766f 59 API calls 99364->99380 99365 25eb4b 99365->99349 99429 27f928 59 API calls 4 library calls 99367->99429 99370->99354 99430 27fad2 89 API calls 4 library calls 99371->99430 99374 227f41 59 API calls 99374->99380 99378 25eaeb 99428 27fad2 89 API calls 4 library calls 99378->99428 99380->99352 99380->99364 99380->99374 99380->99378 99422 27fa6e 59 API calls 2 library calls 99380->99422 99423 27f98f 61 API calls 2 library calls 99380->99423 99424 287428 59 API calls Mailbox 99380->99424 99425 227373 59 API calls Mailbox 99380->99425 99381 25eb04 99382 242ed5 _free 58 API calls 99381->99382 99385 22770f 99384->99385 99389 227682 _memmove 99384->99389 99387 240f36 Mailbox 59 API calls 99385->99387 99386 240f36 Mailbox 59 API calls 99388 227689 99386->99388 99387->99389 99390 240f36 Mailbox 59 API calls 99388->99390 99391 2276b2 99388->99391 99389->99386 99390->99391 99391->99278 99392->99266 99393->99278 99394->99278 99395->99278 99396->99278 99397->99275 99399 225dcf CloseHandle 99398->99399 99400 22593c Mailbox 99399->99400 99401 225dcf CloseHandle 99400->99401 99402 22594b 99401->99402 99402->99344 99403->99296 99404->99299 99405->99309 99406->99325 99407->99305 99408->99354 99409->99354 99410->99354 99411->99354 99412->99354 99413->99354 99414->99354 99416 225de8 99415->99416 99417 225dd9 99415->99417 99416->99417 99418 225ded CloseHandle 99416->99418 99417->99353 99418->99417 99419->99297 99420->99302 99421->99329 99422->99380 99423->99380 99424->99380 99425->99380 99426->99357 99428->99381 99429->99371 99430->99365 99449 123f1cb 99450 123f1d0 99449->99450 99451 123c870 GetPEB 99450->99451 99452 123f1dc 99451->99452 99453 123f290 99452->99453 99454 123f1fa 99452->99454 99471 123fb40 9 API calls 99453->99471 99458 123eea0 99454->99458 99457 123f277 99459 123c870 GetPEB 99458->99459 99462 123ef3f 99459->99462 99461 123ef70 CreateFileW 99461->99462 99464 123ef7d 99461->99464 99463 123ef99 VirtualAlloc 99462->99463 99462->99464 99469 123f0a0 CloseHandle 99462->99469 99470 123f0b0 VirtualFree 99462->99470 99472 123fdb0 GetPEB 99462->99472 99463->99464 99465 123efba ReadFile 99463->99465 99467 123f19a 99464->99467 99468 123f18c VirtualFree 99464->99468 99465->99464 99466 123efd8 VirtualAlloc 99465->99466 99466->99462 99466->99464 99467->99457 99468->99467 99469->99462 99470->99462 99471->99457 99473 123fdda 99472->99473 99473->99461 99474 22e5ec 99477 22ce1a 99474->99477 99476 22e5f8 99478 22ce32 99477->99478 99485 22ce86 99477->99485 99479 22a000 341 API calls 99478->99479 99478->99485 99483 22ce69 99479->99483 99481 262915 99481->99481 99482 22ceaf 99482->99476 99483->99482 99486 229e9c 60 API calls Mailbox 99483->99486 99485->99482 99487 289ed4 89 API calls 4 library calls 99485->99487 99486->99485 99487->99481 99488 22107d 99493 2271eb 99488->99493 99490 22108c 99491 242ec0 __cinit 67 API calls 99490->99491 99492 221096 99491->99492 99494 2271fb __write_nolock 99493->99494 99495 2277c7 59 API calls 99494->99495 99496 2272b1 99495->99496 99497 224864 61 API calls 99496->99497 99498 2272ba 99497->99498 99524 24068b 99498->99524 99501 227e0b 59 API calls 99502 2272d3 99501->99502 99503 223f84 59 API calls 99502->99503 99504 2272e2 99503->99504 99505 2277c7 59 API calls 99504->99505 99506 2272eb 99505->99506 99507 227eec 59 API calls 99506->99507 99508 2272f4 RegOpenKeyExW 99507->99508 99509 25ec0a RegQueryValueExW 99508->99509 99513 227316 Mailbox 99508->99513 99510 25ec27 99509->99510 99511 25ec9c RegCloseKey 99509->99511 99512 240f36 Mailbox 59 API calls 99510->99512 99511->99513 99523 25ecae _wcscat Mailbox __NMSG_WRITE 99511->99523 99514 25ec40 99512->99514 99513->99490 99515 22538e 59 API calls 99514->99515 99516 25ec4b RegQueryValueExW 99515->99516 99517 25ec68 99516->99517 99520 25ec82 99516->99520 99518 227d2c 59 API calls 99517->99518 99518->99520 99519 227b52 59 API calls 99519->99523 99520->99511 99521 227f41 59 API calls 99521->99523 99522 223f84 59 API calls 99522->99523 99523->99513 99523->99519 99523->99521 99523->99522 99525 251ac0 __write_nolock 99524->99525 99526 240698 GetFullPathNameW 99525->99526 99527 2406ba 99526->99527 99528 227d2c 59 API calls 99527->99528 99529 2272c5 99528->99529 99529->99501

                        Control-flow Graph

                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00223B7A
                        • IsDebuggerPresent.KERNEL32 ref: 00223B8C
                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,002E52F8,002E52E0,?,?), ref: 00223BFD
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                          • Part of subcall function 00230A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00223C26,002E52F8,?,?,?), ref: 00230ACE
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00223C81
                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,002D7770,00000010), ref: 0025D3EC
                        • SetCurrentDirectoryW.KERNEL32(?,002E52F8,?,?,?), ref: 0025D424
                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,002D4260,002E52F8,?,?,?), ref: 0025D4AA
                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 0025D4B1
                          • Part of subcall function 00223A58: GetSysColorBrush.USER32(0000000F), ref: 00223A62
                          • Part of subcall function 00223A58: LoadCursorW.USER32(00000000,00007F00), ref: 00223A71
                          • Part of subcall function 00223A58: LoadIconW.USER32(00000063), ref: 00223A88
                          • Part of subcall function 00223A58: LoadIconW.USER32(000000A4), ref: 00223A9A
                          • Part of subcall function 00223A58: LoadIconW.USER32(000000A2), ref: 00223AAC
                          • Part of subcall function 00223A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00223AD2
                          • Part of subcall function 00223A58: RegisterClassExW.USER32(?), ref: 00223B28
                          • Part of subcall function 002239E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00223A15
                          • Part of subcall function 002239E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00223A36
                          • Part of subcall function 002239E7: ShowWindow.USER32(00000000,?,?), ref: 00223A4A
                          • Part of subcall function 002239E7: ShowWindow.USER32(00000000,?,?), ref: 00223A53
                          • Part of subcall function 002243DB: _memset.LIBCMT ref: 00224401
                          • Part of subcall function 002243DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 002244A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                        • String ID: This is a third-party compiled AutoIt script.$runas$%+
                        • API String ID: 529118366-83704245
                        • Opcode ID: 5f494c49665d3dc105f5d58ab4b3a6a9d9c80f47f5ca242e087fb3707aedc61a
                        • Instruction ID: 2ff53284a8ca578aed45a9fef7ff814918540f4f463e56eb301e871a3bf49517
                        • Opcode Fuzzy Hash: 5f494c49665d3dc105f5d58ab4b3a6a9d9c80f47f5ca242e087fb3707aedc61a
                        • Instruction Fuzzy Hash: 775107309782A9BBCF11EBF4FC49AED7B74AB05304B0041A6FD517A161DA784A65CF21

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 983 224fe9-225001 CreateStreamOnHGlobal 984 225003-22501a FindResourceExW 983->984 985 225021-225026 983->985 986 225020 984->986 987 25dc8c-25dc9b LoadResource 984->987 986->985 987->986 988 25dca1-25dcaf SizeofResource 987->988 988->986 989 25dcb5-25dcc0 LockResource 988->989 989->986 990 25dcc6-25dce4 989->990 990->986
                        APIs
                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00224EEE,?,?,00000000,00000000), ref: 00224FF9
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00224EEE,?,?,00000000,00000000), ref: 00225010
                        • LoadResource.KERNEL32(?,00000000,?,?,00224EEE,?,?,00000000,00000000,?,?,?,?,?,?,00224F8F), ref: 0025DC90
                        • SizeofResource.KERNEL32(?,00000000,?,?,00224EEE,?,?,00000000,00000000,?,?,?,?,?,?,00224F8F), ref: 0025DCA5
                        • LockResource.KERNEL32(N",?,?,00224EEE,?,?,00000000,00000000,?,?,?,?,?,?,00224F8F,00000000), ref: 0025DCB8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT$N"
                        • API String ID: 3051347437-927132664
                        • Opcode ID: 55ead24a4528d7af98df7df5e9625189617e73c91439426225f6202c784b9630
                        • Instruction ID: 0b3009284320cc8462b6fa953e0975cc34fd26e58fb53087c5ab0a3bbccd4bc0
                        • Opcode Fuzzy Hash: 55ead24a4528d7af98df7df5e9625189617e73c91439426225f6202c784b9630
                        • Instruction Fuzzy Hash: 07115E75250711BFD7218BA5ED48F777BB9EBCAB11F108168F805C6250DBB1EC108660

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1047 224afe-224b5e call 2277c7 GetVersionExW call 227d2c 1052 224b64 1047->1052 1053 224c69-224c6b 1047->1053 1055 224b67-224b6c 1052->1055 1054 25dac0-25dacc 1053->1054 1056 25dacd-25dad1 1054->1056 1057 224b72 1055->1057 1058 224c70-224c71 1055->1058 1060 25dad4-25dae0 1056->1060 1061 25dad3 1056->1061 1059 224b73-224baa call 227e8c call 227886 1057->1059 1058->1059 1069 224bb0-224bb1 1059->1069 1070 25dbbd-25dbc0 1059->1070 1060->1056 1063 25dae2-25dae7 1060->1063 1061->1060 1063->1055 1065 25daed-25daf4 1063->1065 1065->1054 1067 25daf6 1065->1067 1071 25dafb-25dafe 1067->1071 1069->1071 1072 224bb7-224bc2 1069->1072 1073 25dbc2 1070->1073 1074 25dbd9-25dbdd 1070->1074 1075 25db04-25db22 1071->1075 1076 224bf1-224c08 GetCurrentProcess IsWow64Process 1071->1076 1077 25db43-25db49 1072->1077 1078 224bc8-224bca 1072->1078 1079 25dbc5 1073->1079 1081 25dbdf-25dbe8 1074->1081 1082 25dbc8-25dbd1 1074->1082 1075->1076 1080 25db28-25db2e 1075->1080 1083 224c0a 1076->1083 1084 224c0d-224c1e 1076->1084 1089 25db53-25db59 1077->1089 1090 25db4b-25db4e 1077->1090 1085 224bd0-224bd3 1078->1085 1086 25db5e-25db6a 1078->1086 1079->1082 1087 25db30-25db33 1080->1087 1088 25db38-25db3e 1080->1088 1081->1079 1091 25dbea-25dbed 1081->1091 1082->1074 1083->1084 1092 224c20-224c30 call 224c95 1084->1092 1093 224c89-224c93 GetSystemInfo 1084->1093 1094 224bd9-224be8 1085->1094 1095 25db8a-25db8d 1085->1095 1097 25db74-25db7a 1086->1097 1098 25db6c-25db6f 1086->1098 1087->1076 1088->1076 1089->1076 1090->1076 1091->1082 1104 224c32-224c3f call 224c95 1092->1104 1105 224c7d-224c87 GetSystemInfo 1092->1105 1096 224c56-224c66 1093->1096 1102 25db7f-25db85 1094->1102 1103 224bee 1094->1103 1095->1076 1101 25db93-25dba8 1095->1101 1097->1076 1098->1076 1106 25dbb2-25dbb8 1101->1106 1107 25dbaa-25dbad 1101->1107 1102->1076 1103->1076 1112 224c41-224c45 GetNativeSystemInfo 1104->1112 1113 224c76-224c7b 1104->1113 1109 224c47-224c4b 1105->1109 1106->1076 1107->1076 1109->1096 1111 224c4d-224c50 FreeLibrary 1109->1111 1111->1096 1112->1109 1113->1112
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00224B2B
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        • GetCurrentProcess.KERNEL32(?,002AFAEC,00000000,00000000,?), ref: 00224BF8
                        • IsWow64Process.KERNEL32(00000000), ref: 00224BFF
                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00224C45
                        • FreeLibrary.KERNEL32(00000000), ref: 00224C50
                        • GetSystemInfo.KERNEL32(00000000), ref: 00224C81
                        • GetSystemInfo.KERNEL32(00000000), ref: 00224C8D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                        • String ID:
                        • API String ID: 1986165174-0
                        • Opcode ID: 442c462d079df06fb41da0ae6fa712cfbfe29429b700431050a113da7f2afd6a
                        • Instruction ID: 0c6c5cfb3d9883b0ae6420f83c176b6da6ea75b7e7ec647e1be304ba652fe0d4
                        • Opcode Fuzzy Hash: 442c462d079df06fb41da0ae6fa712cfbfe29429b700431050a113da7f2afd6a
                        • Instruction Fuzzy Hash: DD91283196A7D1EEC731DFA8A5511AAFFE5AF26300B444E5EE4CB43A01D630E918C71D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: pb.$%+
                        • API String ID: 3964851224-3783737210
                        • Opcode ID: 714340440766e3425a35a27f0af3b8d802f609b61097e925653d019a6bc9d6dc
                        • Instruction ID: 9d13df7d20ee4f041c8b4aa55bb12f06d67cfa28d78d3038ea9f3bd1af1db5f4
                        • Opcode Fuzzy Hash: 714340440766e3425a35a27f0af3b8d802f609b61097e925653d019a6bc9d6dc
                        • Instruction Fuzzy Hash: 9C927BB06283519FD724DF14C490B2ABBE1BF88304F14896DE98A8B751D771ECA5CF92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: Dd.$Dd.$Dd.$Dd.$Variable must be of type 'Object'.
                        • API String ID: 0-4147315530
                        • Opcode ID: 36309f306056434c7366421b189939286e68b5f096308728819e5c5bc2a070f0
                        • Instruction ID: ac6b790672e7feb82a1f8756c6a85740539ccae679644cf340b66564c56ab844
                        • Opcode Fuzzy Hash: 36309f306056434c7366421b189939286e68b5f096308728819e5c5bc2a070f0
                        • Instruction Fuzzy Hash: 98A2C274A20226EFCF24CF94E484AADB7B1FF58300F658069E9059B351D771EDA2DB90
                        APIs
                        • GetFileAttributesW.KERNELBASE(?,0025E6F1), ref: 002844AB
                        • FindFirstFileW.KERNELBASE(?,?), ref: 002844BC
                        • FindClose.KERNEL32(00000000), ref: 002844CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirst
                        • String ID:
                        • API String ID: 48322524-0
                        • Opcode ID: f1b39e15d03dddf018ca10747bc0882d2325292eee58a99b64d7e1711ddffe94
                        • Instruction ID: f7fb55577b4fa737bb33890a639ebb245b138a5a8891155887370bc10671db63
                        • Opcode Fuzzy Hash: f1b39e15d03dddf018ca10747bc0882d2325292eee58a99b64d7e1711ddffe94
                        • Instruction Fuzzy Hash: 0EE0D835821402575210BB78FC0D5E9779CAE06335F100715F935C10D0EB786D208695
                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00230BBB
                        • timeGetTime.WINMM ref: 00230E76
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00230FB3
                        • Sleep.KERNEL32(0000000A), ref: 00230FC1
                        • LockWindowUpdate.USER32(00000000,?,?), ref: 0023105A
                        • DestroyWindow.USER32 ref: 00231066
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00231080
                        • Sleep.KERNEL32(0000000A,?,?), ref: 002651DC
                        • TranslateMessage.USER32(?), ref: 00265FB9
                        • DispatchMessageW.USER32(?), ref: 00265FC7
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00265FDB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb.$pb.$pb.$pb.
                        • API String ID: 4212290369-486499698
                        • Opcode ID: e4a369438295388ae0aa35c79764077388aa12345738b5321f459b7285349b87
                        • Instruction ID: e831ac6ef805783213c33298639e4dc768ae986ccf18909800063b9887507a7d
                        • Opcode Fuzzy Hash: e4a369438295388ae0aa35c79764077388aa12345738b5321f459b7285349b87
                        • Instruction Fuzzy Hash: AFB20670628752DFD724DF24C898BAAB7E5BF84304F14491DF48A87291DB71E8A4CF92

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00289008: __time64.LIBCMT ref: 00289012
                          • Part of subcall function 00225045: _fseek.LIBCMT ref: 0022505D
                        • __wsplitpath.LIBCMT ref: 002892DD
                          • Part of subcall function 0024426E: __wsplitpath_helper.LIBCMT ref: 002442AE
                        • _wcscpy.LIBCMT ref: 002892F0
                        • _wcscat.LIBCMT ref: 00289303
                        • __wsplitpath.LIBCMT ref: 00289328
                        • _wcscat.LIBCMT ref: 0028933E
                        • _wcscat.LIBCMT ref: 00289351
                          • Part of subcall function 0028904E: _memmove.LIBCMT ref: 00289087
                          • Part of subcall function 0028904E: _memmove.LIBCMT ref: 00289096
                        • _wcscmp.LIBCMT ref: 00289298
                          • Part of subcall function 002897DD: _wcscmp.LIBCMT ref: 002898CD
                          • Part of subcall function 002897DD: _wcscmp.LIBCMT ref: 002898E0
                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 002894FB
                        • _wcsncpy.LIBCMT ref: 0028956E
                        • DeleteFileW.KERNEL32(?,?), ref: 002895A4
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 002895BA
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002895CB
                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 002895DD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                        • String ID:
                        • API String ID: 1500180987-0
                        • Opcode ID: dbb5735e487bfa8964e45edc5df26dc2bb3c14dedb1ee60ae6fa79095ba1bc14
                        • Instruction ID: ea215fac5b914aeba51640070e3df9377b30ade326b990fecc6a24cf4e01e536
                        • Opcode Fuzzy Hash: dbb5735e487bfa8964e45edc5df26dc2bb3c14dedb1ee60ae6fa79095ba1bc14
                        • Instruction Fuzzy Hash: 5AC16DB5D11129ABDF21EF95CC85AEEB7BCEF45300F0440A6F609E7181DB709A948F64

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00223074
                        • RegisterClassExW.USER32(00000030), ref: 0022309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002230AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 002230CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002230DC
                        • LoadIconW.USER32(000000A9), ref: 002230F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00223101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: e510d2c036e13a436b1d24983c462e605b82e5f87a5b79012fab2d1899d32dd0
                        • Instruction ID: ea0bb2c7f4683700896c1e496b30bd01d38933e4bab3174c706a30c7c3e6c629
                        • Opcode Fuzzy Hash: e510d2c036e13a436b1d24983c462e605b82e5f87a5b79012fab2d1899d32dd0
                        • Instruction Fuzzy Hash: BA316BB1890355AFDB50CFE4ED886DDBBF0FB0A314F14412AE580EA2A0D7B90581CF50

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00223074
                        • RegisterClassExW.USER32(00000030), ref: 0022309E
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002230AF
                        • InitCommonControlsEx.COMCTL32(?), ref: 002230CC
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002230DC
                        • LoadIconW.USER32(000000A9), ref: 002230F2
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00223101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: cb972e38c0dd281265d25758d12d03812cbfe2373c3d12ff9e4d69b4812c2197
                        • Instruction ID: 44021bd185e973fe538cab0e820c95fe0733b719d5b1fec3e66c6ee34d412d2a
                        • Opcode Fuzzy Hash: cb972e38c0dd281265d25758d12d03812cbfe2373c3d12ff9e4d69b4812c2197
                        • Instruction Fuzzy Hash: EA21E8B1950268AFDB40DFE4FD8CB9DBBF4FB09704F00412AFA10AA2A0DBB545448F91

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00224864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002E52F8,?,002237C0,?), ref: 00224882
                          • Part of subcall function 0024068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,002272C5), ref: 002406AD
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00227308
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0025EC21
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0025EC62
                        • RegCloseKey.ADVAPI32(?), ref: 0025ECA0
                        • _wcscat.LIBCMT ref: 0025ECF9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 2673923337-2727554177
                        • Opcode ID: 4adeb3f3234925eb78658ad5454e2a33f98c2f0c19b8321ebd5d007834a9950b
                        • Instruction ID: 7f98036f1709cc5f562537826b31e67d8b366a134c14b9b8951672e4385debdd
                        • Opcode Fuzzy Hash: 4adeb3f3234925eb78658ad5454e2a33f98c2f0c19b8321ebd5d007834a9950b
                        • Instruction Fuzzy Hash: 1671B071469341AEC704DF65FC8999BBBE8FFA5390F40082EF9448B160EB309958CF55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 760 223633-223681 762 223683-223686 760->762 763 2236e1-2236e3 760->763 765 2236e7 762->765 766 223688-22368f 762->766 763->762 764 2236e5 763->764 767 2236ca-2236d2 DefWindowProcW 764->767 768 25d24c-25d27a call 2311d0 call 2311f3 765->768 769 2236ed-2236f0 765->769 770 223695-22369a 766->770 771 22375d-223765 PostQuitMessage 766->771 772 2236d8-2236de 767->772 804 25d27f-25d286 768->804 774 2236f2-2236f3 769->774 775 223715-22373c SetTimer RegisterWindowMessageW 769->775 776 2236a0-2236a2 770->776 777 25d2bf-25d2d3 call 28281f 770->777 773 223711-223713 771->773 773->772 780 25d1ef-25d1f2 774->780 781 2236f9-22370c KillTimer call 2244cb call 223114 774->781 775->773 782 22373e-223749 CreatePopupMenu 775->782 783 223767-223776 call 224531 776->783 784 2236a8-2236ad 776->784 777->773 796 25d2d9 777->796 789 25d1f4-25d1f6 780->789 790 25d228-25d247 MoveWindow 780->790 781->773 782->773 783->773 792 25d2a4-25d2ab 784->792 793 2236b3-2236b8 784->793 799 25d217-25d223 SetFocus 789->799 800 25d1f8-25d1fb 789->800 790->773 792->767 802 25d2b1-25d2ba call 277f5e 792->802 794 22374b-22375b call 2245df 793->794 795 2236be-2236c4 793->795 794->773 795->767 795->804 796->767 799->773 800->795 805 25d201-25d212 call 2311d0 800->805 802->767 804->767 809 25d28c-25d29f call 2244cb call 2243db 804->809 805->773 809->767
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?), ref: 002236D2
                        • KillTimer.USER32(?,00000001), ref: 002236FC
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0022371F
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0022372A
                        • CreatePopupMenu.USER32 ref: 0022373E
                        • PostQuitMessage.USER32(00000000), ref: 0022375F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated$%+
                        • API String ID: 129472671-3833644150
                        • Opcode ID: 6509f44f52793cf9131feb0ebc68f1a8e4eb3095183568fea1af5f7419b196be
                        • Instruction ID: e751c9a76ab09f2ed81ea28f2f6abad306152e7b15906a7d8c8d73414df3e7fd
                        • Opcode Fuzzy Hash: 6509f44f52793cf9131feb0ebc68f1a8e4eb3095183568fea1af5f7419b196be
                        • Instruction Fuzzy Hash: 104125B1270566BBDF20EFE4FD4DB797658EB00300F100125FA468A2A2CAB99A749765

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00223A62
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00223A71
                        • LoadIconW.USER32(00000063), ref: 00223A88
                        • LoadIconW.USER32(000000A4), ref: 00223A9A
                        • LoadIconW.USER32(000000A2), ref: 00223AAC
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00223AD2
                        • RegisterClassExW.USER32(?), ref: 00223B28
                          • Part of subcall function 00223041: GetSysColorBrush.USER32(0000000F), ref: 00223074
                          • Part of subcall function 00223041: RegisterClassExW.USER32(00000030), ref: 0022309E
                          • Part of subcall function 00223041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 002230AF
                          • Part of subcall function 00223041: InitCommonControlsEx.COMCTL32(?), ref: 002230CC
                          • Part of subcall function 00223041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 002230DC
                          • Part of subcall function 00223041: LoadIconW.USER32(000000A9), ref: 002230F2
                          • Part of subcall function 00223041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00223101
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: c08cf71e61fffed71141a45b183880d706a738152958d5dbd1fe962d913f7bda
                        • Instruction ID: 2fc010c286d67cfeaee6d98d7523511d593e8c7f7b82f657e89575a53892f345
                        • Opcode Fuzzy Hash: c08cf71e61fffed71141a45b183880d706a738152958d5dbd1fe962d913f7bda
                        • Instruction Fuzzy Hash: 7E215E71DA0364AFDB10DFA4FD8DB9DBBB4FB08715F000129FA04AA2A1D7B546508F94

                        Control-flow Graph

                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R.
                        • API String ID: 1825951767-1225404995
                        • Opcode ID: 5a25355148a05eb0516b8c449422fab10a91d9f4679d6ee5a3277750e4e49482
                        • Instruction ID: cedfb57b580b1a387f9d78b4297ea579193d1200668991df81db1dbda6da5172
                        • Opcode Fuzzy Hash: 5a25355148a05eb0516b8c449422fab10a91d9f4679d6ee5a3277750e4e49482
                        • Instruction Fuzzy Hash: 99A14F71930239AACB14EFE0EC959EEB7B8BF15300F44042AE516B7191DF785A69CF60

                        Control-flow Graph

                        APIs
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00240313
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 0024031B
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00240326
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00240331
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00240339
                          • Part of subcall function 002402E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00240341
                          • Part of subcall function 00236259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0022FA90), ref: 002362B4
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0022FB2D
                        • OleInitialize.OLE32(00000000), ref: 0022FBAA
                        • CloseHandle.KERNEL32(00000000), ref: 00264921
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID: <W.$\T.$%+$S.
                        • API String ID: 1986988660-2360567740
                        • Opcode ID: d9e4ae7585f5921ce29b8a632211e2a7d07da0abf48cd8be03d56fe95032124b
                        • Instruction ID: 82a37d65a5fab2011490e46cfb5edbd9bb852907609a662b49f33a1653b1a85f
                        • Opcode Fuzzy Hash: d9e4ae7585f5921ce29b8a632211e2a7d07da0abf48cd8be03d56fe95032124b
                        • Instruction Fuzzy Hash: F081D4B08B1AE08FC384DF69B9D8655BBE5FB4830E790416AD119CF2A1EB7044A4CF51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 993 123eea0-123ef4e call 123c870 996 123ef55-123ef7b call 123fdb0 CreateFileW 993->996 999 123ef82-123ef92 996->999 1000 123ef7d 996->1000 1005 123ef94 999->1005 1006 123ef99-123efb3 VirtualAlloc 999->1006 1001 123f0cd-123f0d1 1000->1001 1002 123f113-123f116 1001->1002 1003 123f0d3-123f0d7 1001->1003 1007 123f119-123f120 1002->1007 1008 123f0e3-123f0e7 1003->1008 1009 123f0d9-123f0dc 1003->1009 1005->1001 1010 123efb5 1006->1010 1011 123efba-123efd1 ReadFile 1006->1011 1012 123f122-123f12d 1007->1012 1013 123f175-123f18a 1007->1013 1014 123f0f7-123f0fb 1008->1014 1015 123f0e9-123f0f3 1008->1015 1009->1008 1010->1001 1018 123efd3 1011->1018 1019 123efd8-123f018 VirtualAlloc 1011->1019 1020 123f131-123f13d 1012->1020 1021 123f12f 1012->1021 1022 123f19a-123f1a2 1013->1022 1023 123f18c-123f197 VirtualFree 1013->1023 1016 123f10b 1014->1016 1017 123f0fd-123f107 1014->1017 1015->1014 1016->1002 1017->1016 1018->1001 1024 123f01a 1019->1024 1025 123f01f-123f03a call 1240000 1019->1025 1026 123f151-123f15d 1020->1026 1027 123f13f-123f14f 1020->1027 1021->1013 1023->1022 1024->1001 1033 123f045-123f04f 1025->1033 1030 123f16a-123f170 1026->1030 1031 123f15f-123f168 1026->1031 1029 123f173 1027->1029 1029->1007 1030->1029 1031->1029 1034 123f082-123f096 call 123fe10 1033->1034 1035 123f051-123f080 call 1240000 1033->1035 1040 123f09a-123f09e 1034->1040 1041 123f098 1034->1041 1035->1033 1043 123f0a0-123f0a4 CloseHandle 1040->1043 1044 123f0aa-123f0ae 1040->1044 1041->1001 1043->1044 1045 123f0b0-123f0bb VirtualFree 1044->1045 1046 123f0be-123f0c7 1044->1046 1045->1046 1046->996 1046->1001
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0123EF71
                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0123F197
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateFileFreeVirtual
                        • String ID:
                        • API String ID: 204039940-0
                        • Opcode ID: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                        • Instruction ID: 3f8747ca54e780e08832b8d36ba06f0563fe5532c6ff7bc480fea2b09b7fc96c
                        • Opcode Fuzzy Hash: 640a513b0a1dc75cf27b9d1dcd7263df352c7e5bc7e4f1208c2f85c57f315c64
                        • Instruction Fuzzy Hash: 31A15AB0E10209EBDB14CFA8D985BEEBBB5FF88304F208159E211BB280C7759A45CF55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1114 2239e7-223a57 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00223A15
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00223A36
                        • ShowWindow.USER32(00000000,?,?), ref: 00223A4A
                        • ShowWindow.USER32(00000000,?,?), ref: 00223A53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: b9d4d0a938408137b1d0ca56a82f957519accdabc4c30115c55708377b28502f
                        • Instruction ID: 52fa859590dc739c203082681a69543507491b09776fa4ed664afdd87161fe13
                        • Opcode Fuzzy Hash: b9d4d0a938408137b1d0ca56a82f957519accdabc4c30115c55708377b28502f
                        • Instruction Fuzzy Hash: 9EF017706A02E07AEA605763BC8CE6B6E7DD7C7F54F00002ABE00AA171C6650850CAB0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1467 123ec20-123ed99 call 123c870 call 123eb10 CreateFileW 1474 123eda0-123edb0 1467->1474 1475 123ed9b 1467->1475 1478 123edb2 1474->1478 1479 123edb7-123edd1 VirtualAlloc 1474->1479 1476 123ee50-123ee55 1475->1476 1478->1476 1480 123edd3 1479->1480 1481 123edd5-123edec ReadFile 1479->1481 1480->1476 1482 123edf0-123ee2a call 123eb50 call 123db10 1481->1482 1483 123edee 1481->1483 1488 123ee46-123ee4e ExitProcess 1482->1488 1489 123ee2c-123ee41 call 123eba0 1482->1489 1483->1476 1488->1476 1489->1488
                        APIs
                          • Part of subcall function 0123EB10: Sleep.KERNELBASE(000001F4), ref: 0123EB21
                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0123ED8C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateFileSleep
                        • String ID: E5PEAW8VF4KAADLKY2RVBPTUY2PV
                        • API String ID: 2694422964-1656100517
                        • Opcode ID: 53246c61a731197def88c9bb380960feeb1820e768b48162ff16b3c28efd7137
                        • Instruction ID: 3389791b74aae2c76f800396044107d9f06a178a6f0c1ef648872d91b02c8208
                        • Opcode Fuzzy Hash: 53246c61a731197def88c9bb380960feeb1820e768b48162ff16b3c28efd7137
                        • Instruction Fuzzy Hash: 3A61B470D1428CDAEF11CBE8C8487EFBB75AF55304F004199E2487B2C1D7BA5A49CB66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1491 22410d-224123 1492 224200-224204 1491->1492 1493 224129-22413e call 227b76 1491->1493 1496 224144-224164 call 227d2c 1493->1496 1497 25d50d-25d51c LoadStringW 1493->1497 1500 25d527-25d53f call 227c8e call 227143 1496->1500 1502 22416a-22416e 1496->1502 1497->1500 1509 22417e-2241fb call 242f60 call 22463e call 242f3c Shell_NotifyIconW call 225a64 1500->1509 1513 25d545-25d563 call 227e0b call 227143 call 227e0b 1500->1513 1504 224174-224179 call 227c8e 1502->1504 1505 224205-22420e call 2281a7 1502->1505 1504->1509 1505->1509 1509->1492 1513->1509
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0025D51C
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        • _memset.LIBCMT ref: 0022418D
                        • _wcscpy.LIBCMT ref: 002241E1
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 002241F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                        • String ID: Line:
                        • API String ID: 3942752672-1585850449
                        • Opcode ID: c16810ecd95be7d449be08d94918f6c93f98fab9535647cddafccf165d3d2e12
                        • Instruction ID: 9c01db264d69d9070f169db093c331f65727a221ca66a9724bd7c1493c0d1944
                        • Opcode Fuzzy Hash: c16810ecd95be7d449be08d94918f6c93f98fab9535647cddafccf165d3d2e12
                        • Instruction Fuzzy Hash: 5231F57102C365BAD721EBE0FC46FDB77DCAF44304F10451AFA8896091EB74A668CB92
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                        • String ID:
                        • API String ID: 1559183368-0
                        • Opcode ID: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                        • Instruction ID: 59377e0bc4d5464c6a948a20c0b364ae413b7bbdacf392d52450a5a5b8e89615
                        • Opcode Fuzzy Hash: 85023550e632f3a2e029d8803ad8feb89e05da70391b4bd881aae18f065e9b73
                        • Instruction Fuzzy Hash: B251CB30A30B16DBDB2C9F69C88066DB7B6EF41320F644729F8A5962D2D7709D748F40
                        APIs
                          • Part of subcall function 00224F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00224F6F
                        • _free.LIBCMT ref: 0025E5BC
                        • _free.LIBCMT ref: 0025E603
                          • Part of subcall function 00226BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00226D0D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _free$CurrentDirectoryLibraryLoad
                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                        • API String ID: 2861923089-1757145024
                        • Opcode ID: 6998095f1ab589788d4a76a9e02e8c22f27d0f6b8359d30c44d72f5e56be1045
                        • Instruction ID: cc132e5ba2dfbaa779717390a077e8c39f0221ef938730b0ecab88bbcb1e550b
                        • Opcode Fuzzy Hash: 6998095f1ab589788d4a76a9e02e8c22f27d0f6b8359d30c44d72f5e56be1045
                        • Instruction Fuzzy Hash: FC919371934229AFCF08EFA4D8919EDB7B4FF05314F144469F815AB2A1EB349A28CF54
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,002235A1,SwapMouseButtons,00000004,?), ref: 002235D4
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,002235A1,SwapMouseButtons,00000004,?,?,?,?,00222754), ref: 002235F5
                        • RegCloseKey.KERNELBASE(00000000,?,?,002235A1,SwapMouseButtons,00000004,?,?,?,?,00222754), ref: 00223617
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: 79f9b7d9781d01abd13049095802be0f7e82a1ae0b651b0d772968485a22f6c5
                        • Instruction ID: 091167efe512af708ae90a718484e962e2b90b1530e629862a7864ed57c1ff6f
                        • Opcode Fuzzy Hash: 79f9b7d9781d01abd13049095802be0f7e82a1ae0b651b0d772968485a22f6c5
                        • Instruction Fuzzy Hash: 87114871A20228BFDB20CFA4EC44ABEB7BCEF05740F014469E805D7210E6B59E649B68
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 0123E33D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0123E361
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0123E383
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                        • Instruction ID: 6d7b50c0a0dd63989258ef3a55fde76ac073e94054a56cbbf0cae567be9bfa4c
                        • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                        • Instruction Fuzzy Hash: D0620D70A24258DBEB24CFA4C841BDEB771EF98300F1091A9D20DEB390E7759E85CB59
                        APIs
                          • Part of subcall function 00225045: _fseek.LIBCMT ref: 0022505D
                          • Part of subcall function 002897DD: _wcscmp.LIBCMT ref: 002898CD
                          • Part of subcall function 002897DD: _wcscmp.LIBCMT ref: 002898E0
                        • _free.LIBCMT ref: 0028974B
                        • _free.LIBCMT ref: 00289752
                        • _free.LIBCMT ref: 002897BD
                          • Part of subcall function 00242ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00249BA4), ref: 00242EE9
                          • Part of subcall function 00242ED5: GetLastError.KERNEL32(00000000,?,00249BA4), ref: 00242EFB
                        • _free.LIBCMT ref: 002897C5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                        • String ID:
                        • API String ID: 1552873950-0
                        • Opcode ID: b9ba3a950dd1a7030697058870f3ba09b94392d032a6107ab809e5f29304b5ac
                        • Instruction ID: 81b57c89af8e41abbd34f89a615a3e1889d019efa1606d825c2b2d87d22b0888
                        • Opcode Fuzzy Hash: b9ba3a950dd1a7030697058870f3ba09b94392d032a6107ab809e5f29304b5ac
                        • Instruction Fuzzy Hash: C55172F1D14229AFDF249F64DC81AAEBBB9EF48300F14449EF109A3281DB715A90CF58
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                        • String ID:
                        • API String ID: 2782032738-0
                        • Opcode ID: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                        • Instruction ID: 30b3d86189abc54708850dff2615885b4dea0adfe9fa7a3e6ebb4b8ef4214dda
                        • Opcode Fuzzy Hash: c192cc0e54a8f9db57de2592849b4d8a529bf1476805975b929b304db04efb62
                        • Instruction Fuzzy Hash: F6412631A347469BDB1CEEA9C880B6F7BA6AF80360B24863DE805D7640D770DD609B40
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: AU3!P/+$EA06
                        • API String ID: 4104443479-925092189
                        • Opcode ID: 420288d0830c7cb0460010fda3841fc3964ac807c0a97c26a86eeb2d171c62fa
                        • Instruction ID: 60add191b477b129aed0f16c68ab3c77d35c1f2e74b87180a047123e294f20a3
                        • Opcode Fuzzy Hash: 420288d0830c7cb0460010fda3841fc3964ac807c0a97c26a86eeb2d171c62fa
                        • Instruction Fuzzy Hash: 3E419F21A341747BEF21BFE4EC517BE7BA5AB45300F594065EC429B182C5709D648BE1
                        APIs
                        • _memset.LIBCMT ref: 0025ED92
                        • GetOpenFileNameW.COMDLG32(?), ref: 0025EDDC
                          • Part of subcall function 002248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002248A1,?,?,002237C0,?), ref: 002248CE
                          • Part of subcall function 00240911: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00240930
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen_memset
                        • String ID: X
                        • API String ID: 3777226403-3081909835
                        • Opcode ID: 4cafe4187041cb2d2b2a771a1a641d6f9e550c3935c1b7a2e0f791c684449f41
                        • Instruction ID: f014be139a5789b2a6f7d7b2f8d58c467926a350c2e3eacd7c74d4fded461507
                        • Opcode Fuzzy Hash: 4cafe4187041cb2d2b2a771a1a641d6f9e550c3935c1b7a2e0f791c684449f41
                        • Instruction Fuzzy Hash: ED21D431A24298ABCB059FD4D845BEE7BF99F48704F00405AE808AB242DFF459AD8F91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __fread_nolock_memmove
                        • String ID: EA06
                        • API String ID: 1988441806-3962188686
                        • Opcode ID: 967913f84d7ac50cb435a4e5ec3b895a22811799f5450865f6082a1dc255a2e2
                        • Instruction ID: 22e60b8447268ec91f484db2826ac983b138233e72b55a386eb4e3e372b76cb2
                        • Opcode Fuzzy Hash: 967913f84d7ac50cb435a4e5ec3b895a22811799f5450865f6082a1dc255a2e2
                        • Instruction Fuzzy Hash: 4E01F9718142187EDB28DAA8C856EEEBBF89F01701F00459AF592D2181E9B4A6188B60
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?), ref: 002899A1
                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 002899B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: df95ec6805b0298bc4b066e2c5c3a54afb70f9855e5f5962868cd7437f0a5298
                        • Instruction ID: 033efb13e7c00bd356facf277d2eead42cb7e9d90b6bc28b7f5d91764516a15b
                        • Opcode Fuzzy Hash: df95ec6805b0298bc4b066e2c5c3a54afb70f9855e5f5962868cd7437f0a5298
                        • Instruction Fuzzy Hash: 8BD05E7954030DABDB909BE0EC0EFDA773CE705701F0002B1BE94D11A1EEB499A88B91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 33a397ab24161bce077038ab25e8a7933650fdbfa23d6a76cc89b9d2e06b33bb
                        • Instruction ID: 6389a5ce966964609c183aa11db290cd7c47c55e8920c34dfea1da3ef7e6e6d7
                        • Opcode Fuzzy Hash: 33a397ab24161bce077038ab25e8a7933650fdbfa23d6a76cc89b9d2e06b33bb
                        • Instruction Fuzzy Hash: 21F15970A183019FCB14DF28C485A6ABBE5FF88314F14892EF89A9B351D771E955CF82
                        APIs
                        • _memset.LIBCMT ref: 00224401
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 002244A6
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 002244C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$_memset
                        • String ID:
                        • API String ID: 1505330794-0
                        • Opcode ID: fcec74afdf3548eb0db894036a3a097347c35f6c6b6cde9a57d3736b81da9411
                        • Instruction ID: 44f61de004891632234e2e5c638519b5354278ff2f94c6e3808b4570db0e093d
                        • Opcode Fuzzy Hash: fcec74afdf3548eb0db894036a3a097347c35f6c6b6cde9a57d3736b81da9411
                        • Instruction Fuzzy Hash: 6931C570514761DFD720EF64E88479BBBF4FB48308F00092EFA9A87251D7706954CB52
                        APIs
                        • __FF_MSGBANNER.LIBCMT ref: 002458A3
                          • Part of subcall function 0024A2EB: __NMSG_WRITE.LIBCMT ref: 0024A312
                          • Part of subcall function 0024A2EB: __NMSG_WRITE.LIBCMT ref: 0024A31C
                        • __NMSG_WRITE.LIBCMT ref: 002458AA
                          • Part of subcall function 0024A348: GetModuleFileNameW.KERNEL32(00000000,002E33BA,00000104,?,00000001,00000000), ref: 0024A3DA
                          • Part of subcall function 0024A348: ___crtMessageBoxW.LIBCMT ref: 0024A488
                          • Part of subcall function 0024321F: ___crtCorExitProcess.LIBCMT ref: 00243225
                          • Part of subcall function 0024321F: ExitProcess.KERNEL32 ref: 0024322E
                          • Part of subcall function 00248CA8: __getptd_noexit.LIBCMT ref: 00248CA8
                        • RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00240F53,?), ref: 002458CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                        • String ID:
                        • API String ID: 1372826849-0
                        • Opcode ID: 14b0819a23cf7924c647cc3ebf5163ef7e5e24e5dbf52cd00d9c8a867585d6ec
                        • Instruction ID: 5e4cb97ffda0e1bdb5e78fca4449a2dc9b159d32b6e4c1471596e8e45c28c93a
                        • Opcode Fuzzy Hash: 14b0819a23cf7924c647cc3ebf5163ef7e5e24e5dbf52cd00d9c8a867585d6ec
                        • Instruction Fuzzy Hash: A001F5312B1B229BE61D7B74EC86B2E7348DF82761B500026F941AB183DFB09DA04E61
                        APIs
                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,002895F1,?,?,?,?,?,00000004), ref: 00289964
                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,002895F1,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0028997A
                        • CloseHandle.KERNEL32(00000000,?,002895F1,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00289981
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: File$CloseCreateHandleTime
                        • String ID:
                        • API String ID: 3397143404-0
                        • Opcode ID: e198912be961b5a694c05a97a6cfd5c3a740e4062b84c2335a452b6bdcaf4466
                        • Instruction ID: a474303d591b9e03eb08374168f43fdd8166128231474d15262739c02c75a7f3
                        • Opcode Fuzzy Hash: e198912be961b5a694c05a97a6cfd5c3a740e4062b84c2335a452b6bdcaf4466
                        • Instruction Fuzzy Hash: D9E08632241214BBDB312F94FC0DFDA7B18AB06760F144221FB54790E08BB519219798
                        APIs
                        • _free.LIBCMT ref: 00288DC4
                          • Part of subcall function 00242ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00249BA4), ref: 00242EE9
                          • Part of subcall function 00242ED5: GetLastError.KERNEL32(00000000,?,00249BA4), ref: 00242EFB
                        • _free.LIBCMT ref: 00288DD5
                        • _free.LIBCMT ref: 00288DE7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 33ae1c996f9c9f7cc5f494d2acb49351bd07ed813e84366d3f1e78f850c3488c
                        • Instruction ID: 07358b74efaf268e6733b54c17bee86e3cd8b6527460bacf036bbb5b8e4bf8e1
                        • Opcode Fuzzy Hash: 33ae1c996f9c9f7cc5f494d2acb49351bd07ed813e84366d3f1e78f850c3488c
                        • Instruction Fuzzy Hash: 20E05BA1732703C3DA28797D6D40E9313DC9F583A1794081DF509D75C2DE24F8A58634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: CALL
                        • API String ID: 0-4196123274
                        • Opcode ID: 1dcc99fd41648b6d5bb604b35eb89bd8a8261be29f241fd7c476e767c4b190f5
                        • Instruction ID: 7f3ae6c747c139c63344e1d0c50f98d7350611474b5ae148d4b1361fb3927778
                        • Opcode Fuzzy Hash: 1dcc99fd41648b6d5bb604b35eb89bd8a8261be29f241fd7c476e767c4b190f5
                        • Instruction Fuzzy Hash: DE226A70528311EFCB24DF54D494B2AB7E1BF84304F15896DE88A8B661DB71ECA5CF82
                        APIs
                        • IsThemeActive.UXTHEME ref: 00224992
                          • Part of subcall function 002434EC: __lock.LIBCMT ref: 002434F2
                          • Part of subcall function 002434EC: DecodePointer.KERNEL32(00000001,?,002249A7,00277F9C), ref: 002434FE
                          • Part of subcall function 002434EC: EncodePointer.KERNEL32(?,?,002249A7,00277F9C), ref: 00243509
                          • Part of subcall function 00224A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00224A73
                          • Part of subcall function 00224A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00224A88
                          • Part of subcall function 00223B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00223B7A
                          • Part of subcall function 00223B4C: IsDebuggerPresent.KERNEL32 ref: 00223B8C
                          • Part of subcall function 00223B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,002E52F8,002E52E0,?,?), ref: 00223BFD
                          • Part of subcall function 00223B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00223C81
                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 002249D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                        • String ID:
                        • API String ID: 1438897964-0
                        • Opcode ID: ae118538d84c27635f200de598b88dde90ec100949ed7ad37aa2c6ec4df622fd
                        • Instruction ID: 96d4554bf56ad34f4706b8696f54515062486205bf86cf34a5df60fa89372ed0
                        • Opcode Fuzzy Hash: ae118538d84c27635f200de598b88dde90ec100949ed7ad37aa2c6ec4df622fd
                        • Instruction Fuzzy Hash: 36119071824361ABC310EF68FC8990AFBE8EB94750F10451EF5458B2B1DBB09554CF92
                        APIs
                          • Part of subcall function 0024588C: __FF_MSGBANNER.LIBCMT ref: 002458A3
                          • Part of subcall function 0024588C: __NMSG_WRITE.LIBCMT ref: 002458AA
                          • Part of subcall function 0024588C: RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00240F53,?), ref: 002458CF
                        • std::exception::exception.LIBCMT ref: 00240F6C
                        • __CxxThrowException@8.LIBCMT ref: 00240F81
                          • Part of subcall function 0024871B: RaiseException.KERNEL32(?,?,?,002D9E78,00000000,?,?,?,?,00240F86,?,002D9E78,?,00000001), ref: 00248770
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                        • String ID:
                        • API String ID: 3902256705-0
                        • Opcode ID: 2a471dbc7b8d74f9d24f2d645bd2af46d7093dafecd2ed1fe1b4b1c43d6da3ac
                        • Instruction ID: 239f8dcf3857e4cac982a76987c246327cc7ea26149f985e7ecb2299ca5cbdde
                        • Opcode Fuzzy Hash: 2a471dbc7b8d74f9d24f2d645bd2af46d7093dafecd2ed1fe1b4b1c43d6da3ac
                        • Instruction Fuzzy Hash: 60F0A93153431A66C728BE98EC519DE7B9C9F01351F100476FA04A6692EFB19AB889D1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __lock_file_memset
                        • String ID:
                        • API String ID: 26237723-0
                        • Opcode ID: 3b7b4adaca8554b491d8382f6eed9a4fad0cf67774155d016b262d0d27d3c891
                        • Instruction ID: 0a4e59159ffa860e5f3101e6fe172025f093ac5ab1edad2688ec329658c9a3d0
                        • Opcode Fuzzy Hash: 3b7b4adaca8554b491d8382f6eed9a4fad0cf67774155d016b262d0d27d3c891
                        • Instruction Fuzzy Hash: 8101A731831A19EBCF19AF69CC0199FBB72BF80360F544125F8645A152D7758A31DF91
                        APIs
                          • Part of subcall function 00248CA8: __getptd_noexit.LIBCMT ref: 00248CA8
                        • __lock_file.LIBCMT ref: 0024555B
                          • Part of subcall function 00246D8E: __lock.LIBCMT ref: 00246DB1
                        • __fclose_nolock.LIBCMT ref: 00245566
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                        • String ID:
                        • API String ID: 2800547568-0
                        • Opcode ID: c7bd368cc5057796d0d07df88a2da9c5e2557228249c077a667ce9794ce4338c
                        • Instruction ID: f476f411a4fec6a771accc629c201624d5ad8e63b271c5aafb6767e0f3e04285
                        • Opcode Fuzzy Hash: c7bd368cc5057796d0d07df88a2da9c5e2557228249c077a667ce9794ce4338c
                        • Instruction Fuzzy Hash: 9CF0B431931A259BD7187F75880677E67A26F42331F558209F4A4AB1C2CBBC4921AF52
                        APIs
                        • CreateProcessW.KERNELBASE(?,00000000), ref: 0123E33D
                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0123E361
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0123E383
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                        • String ID:
                        • API String ID: 2438371351-0
                        • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                        • Instruction ID: 49c5803b4b16bfef243c255d13a125dfe145e22aa75b08d23d2e6bd020ffd0c9
                        • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                        • Instruction Fuzzy Hash: 8612DE20E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: b8eb306d87080dac426f18344c6ec18a743f8c07957f396794896611c3497aee
                        • Instruction ID: ce82d74018d3389633d559fe0c6f38fd4f88e2335507cc9434594a6cb724bdbc
                        • Opcode Fuzzy Hash: b8eb306d87080dac426f18344c6ec18a743f8c07957f396794896611c3497aee
                        • Instruction Fuzzy Hash: DE31C57522CA13EFC7289F59E090931F7A4FF09320B15C56DE9898B765E770D8A1CB84
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction ID: f6af1aa4d99e59e42c10cf57036b4e811e77b3ad7b5722d2b4adc84b0d79ef9b
                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                        • Instruction Fuzzy Hash: B231D574A10106DBC718DF58C4C4969FBA6FF89300B688AA5E509CB256DB71EDE1CB80
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: ac5afb155a60732411fea2c6b414f29e207351f81d048bad7bcf5aa202625774
                        • Instruction ID: 2f4738e344774782ecca5f3fd1de8c7c3b2cead94450aad31fa739d24a83f64d
                        • Opcode Fuzzy Hash: ac5afb155a60732411fea2c6b414f29e207351f81d048bad7bcf5aa202625774
                        • Instruction Fuzzy Hash: BC4149745283519FDB24CF54C484B1ABBE0BF85318F0988ACE9894B762C732ECA5CF52
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: b87674f85fb40da641aa7b727b9a892742fbd22b6c51f62857705b6a85e1599d
                        • Instruction ID: 610ca5d04cf5d3c02c6ff0f5709b3b82dac4d278dd4790b85522322055915a77
                        • Opcode Fuzzy Hash: b87674f85fb40da641aa7b727b9a892742fbd22b6c51f62857705b6a85e1599d
                        • Instruction Fuzzy Hash: 5C119D71624702AFD728DF55E551D22B7F5EB88320B15C83EE94ACBBA1DB70E890CB00
                        APIs
                          • Part of subcall function 00224D13: FreeLibrary.KERNEL32(00000000,?), ref: 00224D4D
                          • Part of subcall function 002453CB: __wfsopen.LIBCMT ref: 002453D6
                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00224F6F
                          • Part of subcall function 00224CC8: FreeLibrary.KERNEL32(00000000), ref: 00224D02
                          • Part of subcall function 00224DD0: _memmove.LIBCMT ref: 00224E1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Library$Free$Load__wfsopen_memmove
                        • String ID:
                        • API String ID: 1396898556-0
                        • Opcode ID: c9102d5a6a8215355721b840427b6a986fca28bc276d9c815ae0ec0c49e72905
                        • Instruction ID: e3aaeb708286aa02364e9aa0644db9b8c9a0bd0a80f0941248ff1bfca7ee40c0
                        • Opcode Fuzzy Hash: c9102d5a6a8215355721b840427b6a986fca28bc276d9c815ae0ec0c49e72905
                        • Instruction Fuzzy Hash: 79112B31630325BBCF20BFB4ED06B6D77A59F44701F10882AF841961D1DEB55A249F50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID:
                        • API String ID: 1473721057-0
                        • Opcode ID: 514b8526adf46c4b1547adeca3bd27b108345b122a7d5f42eb09f7e8a92cae50
                        • Instruction ID: 4d2e403ebec482f3fda36e3b2c3615b6fd9c8789414abd1fc4bc9606b4b1415b
                        • Opcode Fuzzy Hash: 514b8526adf46c4b1547adeca3bd27b108345b122a7d5f42eb09f7e8a92cae50
                        • Instruction Fuzzy Hash: 7E2124705283119FCB14DF94C484B1ABBE0BF88314F058968E99957B21DB31E869CF92
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 81852b0ab0596b33c5117d4b28862d9aaa8b82c5ff613f6dfa73d39c53cf7666
                        • Instruction ID: 780546c0fd09eef74aa3c45069035229da3d82af499cd6e0b367279a229339a3
                        • Opcode Fuzzy Hash: 81852b0ab0596b33c5117d4b28862d9aaa8b82c5ff613f6dfa73d39c53cf7666
                        • Instruction Fuzzy Hash: 6111A97222D2267BC714AFACE881E6AB399EF45320714412AFD19C72D4DF719C708B91
                        APIs
                        • __lock_file.LIBCMT ref: 00244A16
                          • Part of subcall function 00248CA8: __getptd_noexit.LIBCMT ref: 00248CA8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __getptd_noexit__lock_file
                        • String ID:
                        • API String ID: 2597487223-0
                        • Opcode ID: 32325bd814b560d1a7f0f5940e8f757cfd82fbb899de47962d47115bf06e5515
                        • Instruction ID: 02ff344fec43159214618d09703d695f8e6aeee92c9cbcef26d81790dd9be413
                        • Opcode Fuzzy Hash: 32325bd814b560d1a7f0f5940e8f757cfd82fbb899de47962d47115bf06e5515
                        • Instruction Fuzzy Hash: 98F0C231970215EBDF19BF74CC0679F36A1AF01325F048515F424AA191DBB88970DF51
                        APIs
                        • FreeLibrary.KERNEL32(?,?,002E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00224FDE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 9131347929c07f3b8d66c4d03ded82701a10475003a989cf86205af92b9e6ac6
                        • Instruction ID: 7caa75db8d03c712dbe7c2c837aca38f130de53290dd5ea160a9ff49bdb54719
                        • Opcode Fuzzy Hash: 9131347929c07f3b8d66c4d03ded82701a10475003a989cf86205af92b9e6ac6
                        • Instruction Fuzzy Hash: 97F03071525722DFC734AFA4F594812BBE1AF443253108A3EE5D682A10C7719860DF40
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00240930
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LongNamePath_memmove
                        • String ID:
                        • API String ID: 2514874351-0
                        • Opcode ID: 78cef625dd818b26a02f3e3907cc0a216b00e6df8a1b4528f7678b4a249358f8
                        • Instruction ID: 6da090b816172819bf64625ee334384be71e19f27f08d448987ca5c5498d51c6
                        • Opcode Fuzzy Hash: 78cef625dd818b26a02f3e3907cc0a216b00e6df8a1b4528f7678b4a249358f8
                        • Instruction Fuzzy Hash: A6E0CD3690512867C721D698AC05FFA77EDDFC9791F0401B5FC4CD7209DDB45C918A90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __fread_nolock
                        • String ID:
                        • API String ID: 2638373210-0
                        • Opcode ID: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                        • Instruction ID: 308115f3d69000959c0098a17c05d093d041e1abc45b0b4fd494eab1d67f5a5a
                        • Opcode Fuzzy Hash: 87e92921201f7f350e3b6a5d32947fae34ea2a0dab1f5900b9b8b54ddfacd81a
                        • Instruction Fuzzy Hash: B4E092B5214B009BDB389E24D8017A373E1AB15304F00081CF29AC3642EB63BC51CB59
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __wfsopen
                        • String ID:
                        • API String ID: 197181222-0
                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction ID: 2196766ad6f3cb12e0e1ff671d47a766e99e8ee33ca0be8ffa3b0953e7179d16
                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                        • Instruction Fuzzy Hash: C5B0927644020C77CE012E82EC02A493F599B407A4F408060FB0C185A2A6B3A6709A89
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 0123EB21
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                        • Instruction ID: f1aae7e66977cddc8d009b261c0c43b31b53ed2ac473700ba0aa9623c8695a51
                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                        • Instruction Fuzzy Hash: AAE09A7494010DAFDB00EFA4D54969E7BB4EF04301F1005A1FD0596681DA309A548A62
                        APIs
                        • Sleep.KERNELBASE(000001F4), ref: 0123EB21
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction ID: 9143643531def7124edba987e2fa8712122fb77f042c47ec7cee887c96ad6387
                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                        • Instruction Fuzzy Hash: 76E0BF7494010D9FDB00EFA4D54969E7BB4EF04301F100161FD0192281D63099508A72
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 002ACBA1
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002ACBFF
                        • GetWindowLongW.USER32(?,000000F0), ref: 002ACC40
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002ACC6A
                        • SendMessageW.USER32 ref: 002ACC93
                        • _wcsncpy.LIBCMT ref: 002ACCFF
                        • GetKeyState.USER32(00000011), ref: 002ACD20
                        • GetKeyState.USER32(00000009), ref: 002ACD2D
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 002ACD43
                        • GetKeyState.USER32(00000010), ref: 002ACD4D
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 002ACD76
                        • SendMessageW.USER32 ref: 002ACD9D
                        • SendMessageW.USER32(?,00001030,?,002AB37C), ref: 002ACEA1
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 002ACEB7
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 002ACECA
                        • SetCapture.USER32(?), ref: 002ACED3
                        • ClientToScreen.USER32(?,?), ref: 002ACF38
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 002ACF45
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002ACF5F
                        • ReleaseCapture.USER32 ref: 002ACF6A
                        • GetCursorPos.USER32(?), ref: 002ACFA4
                        • ScreenToClient.USER32(?,?), ref: 002ACFB1
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 002AD00D
                        • SendMessageW.USER32 ref: 002AD03B
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 002AD078
                        • SendMessageW.USER32 ref: 002AD0A7
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 002AD0C8
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 002AD0D7
                        • GetCursorPos.USER32(?), ref: 002AD0F7
                        • ScreenToClient.USER32(?,?), ref: 002AD104
                        • GetParent.USER32(?), ref: 002AD124
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 002AD18D
                        • SendMessageW.USER32 ref: 002AD1BE
                        • ClientToScreen.USER32(?,?), ref: 002AD21C
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 002AD24C
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 002AD276
                        • SendMessageW.USER32 ref: 002AD299
                        • ClientToScreen.USER32(?,?), ref: 002AD2EB
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 002AD31F
                          • Part of subcall function 002225DB: GetWindowLongW.USER32(?,000000EB), ref: 002225EC
                        • GetWindowLongW.USER32(?,000000F0), ref: 002AD3BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                        • String ID: @GUI_DRAGID$F$pb.
                        • API String ID: 3977979337-3736991238
                        • Opcode ID: 95dafaff62617d664528b37c579c6e7dc8ecd0028498bc6593d555106f20d61e
                        • Instruction ID: 7a1e6b6896000eb74e9f7400dceff8cc730cbbc2cc232a05c30191291deccb46
                        • Opcode Fuzzy Hash: 95dafaff62617d664528b37c579c6e7dc8ecd0028498bc6593d555106f20d61e
                        • Instruction Fuzzy Hash: 9942C030224342EFDB24CF64D888AAABBE5FF4A714F240919F555972B1CB72D864CF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove$_memset
                        • String ID: ]-$DEFINE$Oa#$P\-$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                        • API String ID: 1357608183-814072518
                        • Opcode ID: d8a528f4df9ba3a4d37a1fe93f510419d72e3636d0925b2ac58829ec5956d218
                        • Instruction ID: b16bf41f71e5ac6d6f69851a77a54ae65d0cd13b32e096d00875e02294e596fe
                        • Opcode Fuzzy Hash: d8a528f4df9ba3a4d37a1fe93f510419d72e3636d0925b2ac58829ec5956d218
                        • Instruction Fuzzy Hash: BB93A471A20216DFDF24CF58C881BADB7B1FF48710F25816AE949EB281E7709E91DB40
                        APIs
                        • GetForegroundWindow.USER32(00000000,?), ref: 00224A3D
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0025D9BE
                        • IsIconic.USER32(?), ref: 0025D9C7
                        • ShowWindow.USER32(?,00000009), ref: 0025D9D4
                        • SetForegroundWindow.USER32(?), ref: 0025D9DE
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0025D9F4
                        • GetCurrentThreadId.KERNEL32 ref: 0025D9FB
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0025DA07
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0025DA18
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0025DA20
                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 0025DA28
                        • SetForegroundWindow.USER32(?), ref: 0025DA2B
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0025DA40
                        • keybd_event.USER32(00000012,00000000), ref: 0025DA4B
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0025DA55
                        • keybd_event.USER32(00000012,00000000), ref: 0025DA5A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0025DA63
                        • keybd_event.USER32(00000012,00000000), ref: 0025DA68
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0025DA72
                        • keybd_event.USER32(00000012,00000000), ref: 0025DA77
                        • SetForegroundWindow.USER32(?), ref: 0025DA7A
                        • AttachThreadInput.USER32(?,?,00000000), ref: 0025DAA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: 1821d478787d3739b3d23324c906b3e30f9de0b45d3c527e87f22fe1b48357af
                        • Instruction ID: 6990e813d893cddc4e8fb70e22cf0b6978e2cf1cf20b1c1583442f6a5a31cf4e
                        • Opcode Fuzzy Hash: 1821d478787d3739b3d23324c906b3e30f9de0b45d3c527e87f22fe1b48357af
                        • Instruction Fuzzy Hash: CA317271A90318BBEB306FA1AD49F7F7F6CEB45B51F104025FE04EA1D0DAB45D10AAA4
                        APIs
                          • Part of subcall function 00278AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00278AED
                          • Part of subcall function 00278AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00278B1A
                          • Part of subcall function 00278AA3: GetLastError.KERNEL32 ref: 00278B27
                        • _memset.LIBCMT ref: 0027867B
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 002786CD
                        • CloseHandle.KERNEL32(?), ref: 002786DE
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002786F5
                        • GetProcessWindowStation.USER32 ref: 0027870E
                        • SetProcessWindowStation.USER32(00000000), ref: 00278718
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00278732
                          • Part of subcall function 002784F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00278631), ref: 00278508
                          • Part of subcall function 002784F3: CloseHandle.KERNEL32(?,?,00278631), ref: 0027851A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                        • String ID: $default$winsta0
                        • API String ID: 2063423040-1027155976
                        • Opcode ID: c1a1f95d796b86073957639bbb1e3c227b5c0bfe4af6b588cbf8e741f6ea7a32
                        • Instruction ID: 3d76329dd15cfda82fdd40e75b41daae2853bc2c8da7e5dc5c5f013d8437d69f
                        • Opcode Fuzzy Hash: c1a1f95d796b86073957639bbb1e3c227b5c0bfe4af6b588cbf8e741f6ea7a32
                        • Instruction Fuzzy Hash: FE818A7196020EEFDF119FA4DD4DAEEBBB8EF05304F048169F918A6161DB358E24DB21
                        APIs
                        • OpenClipboard.USER32(002AF910), ref: 002940A6
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 002940B4
                        • GetClipboardData.USER32(0000000D), ref: 002940BC
                        • CloseClipboard.USER32 ref: 002940C8
                        • GlobalLock.KERNEL32(00000000), ref: 002940E4
                        • CloseClipboard.USER32 ref: 002940EE
                        • GlobalUnlock.KERNEL32(00000000), ref: 00294103
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00294110
                        • GetClipboardData.USER32(00000001), ref: 00294118
                        • GlobalLock.KERNEL32(00000000), ref: 00294125
                        • GlobalUnlock.KERNEL32(00000000), ref: 00294159
                        • CloseClipboard.USER32 ref: 00294269
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                        • String ID:
                        • API String ID: 3222323430-0
                        • Opcode ID: 18de4b63d28050bf1ba6f4fdd6623da1c42f2c0c92c44f424625c89e9b3aea4a
                        • Instruction ID: 0358b3245c9bc08ee68dfe3b1b2ef99e63745c27ba835c3b19f38db3fafbab81
                        • Opcode Fuzzy Hash: 18de4b63d28050bf1ba6f4fdd6623da1c42f2c0c92c44f424625c89e9b3aea4a
                        • Instruction Fuzzy Hash: B1519235224302AFDB10FFA0ED89F6E77A8AF85B01F004529F956D21A1DF74D9168F62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 0028C819
                        • FindClose.KERNEL32(00000000), ref: 0028C86D
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0028C892
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0028C8A9
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0028C8D0
                        • __swprintf.LIBCMT ref: 0028C91C
                        • __swprintf.LIBCMT ref: 0028C95F
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                        • __swprintf.LIBCMT ref: 0028C9B3
                          • Part of subcall function 00243818: __woutput_l.LIBCMT ref: 00243871
                        • __swprintf.LIBCMT ref: 0028CA01
                          • Part of subcall function 00243818: __flsbuf.LIBCMT ref: 00243893
                          • Part of subcall function 00243818: __flsbuf.LIBCMT ref: 002438AB
                        • __swprintf.LIBCMT ref: 0028CA50
                        • __swprintf.LIBCMT ref: 0028CA9F
                        • __swprintf.LIBCMT ref: 0028CAEE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                        • API String ID: 3953360268-2428617273
                        • Opcode ID: 71d359496a196ce4a2db663a4e3ffe74edd0e25005327a298d9eb86b7b133879
                        • Instruction ID: aaeff5ac37e19b5951f395bf06777ec6fba1582dcd47b6c221732038fb74809b
                        • Opcode Fuzzy Hash: 71d359496a196ce4a2db663a4e3ffe74edd0e25005327a298d9eb86b7b133879
                        • Instruction Fuzzy Hash: 75A13CB1428314BBC744FBA4D986DAFB7ECFF84704F404929F58582191EB34DA58CB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0028F042
                        • _wcscmp.LIBCMT ref: 0028F057
                        • _wcscmp.LIBCMT ref: 0028F06E
                        • GetFileAttributesW.KERNEL32(?), ref: 0028F080
                        • SetFileAttributesW.KERNEL32(?,?), ref: 0028F09A
                        • FindNextFileW.KERNEL32(00000000,?), ref: 0028F0B2
                        • FindClose.KERNEL32(00000000), ref: 0028F0BD
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0028F0D9
                        • _wcscmp.LIBCMT ref: 0028F100
                        • _wcscmp.LIBCMT ref: 0028F117
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0028F129
                        • SetCurrentDirectoryW.KERNEL32(002D8920), ref: 0028F147
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0028F151
                        • FindClose.KERNEL32(00000000), ref: 0028F15E
                        • FindClose.KERNEL32(00000000), ref: 0028F170
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1803514871-438819550
                        • Opcode ID: cb6cea0e813c2a152f7855ffba5d8579fbe96d544893a44e709a1b85236045ac
                        • Instruction ID: 8fd64b235bcb8b3b947bd57d3237c0a7c484b055c9d9c805eabe3c8118506411
                        • Opcode Fuzzy Hash: cb6cea0e813c2a152f7855ffba5d8579fbe96d544893a44e709a1b85236045ac
                        • Instruction Fuzzy Hash: 5F31C03651120AABCB50EFB0ED4DBEE73AC9F0A320F104175E804E21E1EB34DE658B64
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002A09DE
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,002AF910,00000000,?,00000000,?,?), ref: 002A0A4C
                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 002A0A94
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 002A0B1D
                        • RegCloseKey.ADVAPI32(?), ref: 002A0E3D
                        • RegCloseKey.ADVAPI32(00000000), ref: 002A0E4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Close$ConnectCreateRegistryValue
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 536824911-966354055
                        • Opcode ID: 8944adfbed5000d777257705bf2a4647f1a67f014fb8e4d51ad39137e9c1014f
                        • Instruction ID: f086834438883f58005c0c7149d9737452c83dbd7e27d973e6c886474215710d
                        • Opcode Fuzzy Hash: 8944adfbed5000d777257705bf2a4647f1a67f014fb8e4d51ad39137e9c1014f
                        • Instruction Fuzzy Hash: 5A025B75620611AFDB14DF64D885E2AB7E5EF89320F04885DF8899B362CB31ED60CF81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0D,$0E,$0F,$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa#$UCP)$UTF)$UTF16)$pG,
                        • API String ID: 0-1382947706
                        • Opcode ID: d56f02d9770bd4023c24c36b0cfb8439381178fa52f610fc2d6f9b65a81d52f0
                        • Instruction ID: ee319d9b4dbb30b9d298cb9eacfbdc044bd74a204b0d212c2548df8ef29c4855
                        • Opcode Fuzzy Hash: d56f02d9770bd4023c24c36b0cfb8439381178fa52f610fc2d6f9b65a81d52f0
                        • Instruction Fuzzy Hash: 0F7271B5E2021ADBDB14CF59C8547AEB7B9FF44710F14816AE809EB290EB709DA1CF50
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0028F19F
                        • _wcscmp.LIBCMT ref: 0028F1B4
                        • _wcscmp.LIBCMT ref: 0028F1CB
                          • Part of subcall function 002843C6: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 002843E1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 0028F1FA
                        • FindClose.KERNEL32(00000000), ref: 0028F205
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 0028F221
                        • _wcscmp.LIBCMT ref: 0028F248
                        • _wcscmp.LIBCMT ref: 0028F25F
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0028F271
                        • SetCurrentDirectoryW.KERNEL32(002D8920), ref: 0028F28F
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0028F299
                        • FindClose.KERNEL32(00000000), ref: 0028F2A6
                        • FindClose.KERNEL32(00000000), ref: 0028F2B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 1824444939-438819550
                        • Opcode ID: c46def5e543fb2878e6d44cf3bbceb650ed95d4b7bb3a9e09ba6a949687dddf3
                        • Instruction ID: 0129d99352675cede6dbe135c4a2f766a318138f5e703476af2a31a38d47150a
                        • Opcode Fuzzy Hash: c46def5e543fb2878e6d44cf3bbceb650ed95d4b7bb3a9e09ba6a949687dddf3
                        • Instruction Fuzzy Hash: DD31F33A51221A6BDB50EFA4ED58BDE73AC9F06320F1041B1EC44A32E0DB30DE65CB64
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0028A299
                        • __swprintf.LIBCMT ref: 0028A2BB
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0028A2F8
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0028A31D
                        • _memset.LIBCMT ref: 0028A33C
                        • _wcsncpy.LIBCMT ref: 0028A378
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0028A3AD
                        • CloseHandle.KERNEL32(00000000), ref: 0028A3B8
                        • RemoveDirectoryW.KERNEL32(?), ref: 0028A3C1
                        • CloseHandle.KERNEL32(00000000), ref: 0028A3CB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                        • String ID: :$\$\??\%s
                        • API String ID: 2733774712-3457252023
                        • Opcode ID: f88163a67cee3da535cb7e54c55b64577a9a32cd44461980159bd9e6c1b1d3fb
                        • Instruction ID: dcd4e827fb708099c592ce9adf94783ddfa9e5658eb0c29171b1dc5571454fbd
                        • Opcode Fuzzy Hash: f88163a67cee3da535cb7e54c55b64577a9a32cd44461980159bd9e6c1b1d3fb
                        • Instruction Fuzzy Hash: 8C31D47591010AABEB21EFA0DC49FEB73BCEF89700F1040B6F908D21A0EB7496548B24
                        APIs
                          • Part of subcall function 0027852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00278546
                          • Part of subcall function 0027852A: GetLastError.KERNEL32(?,0027800A,?,?,?), ref: 00278550
                          • Part of subcall function 0027852A: GetProcessHeap.KERNEL32(00000008,?,?,0027800A,?,?,?), ref: 0027855F
                          • Part of subcall function 0027852A: HeapAlloc.KERNEL32(00000000,?,0027800A,?,?,?), ref: 00278566
                          • Part of subcall function 0027852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0027857D
                          • Part of subcall function 002785C7: GetProcessHeap.KERNEL32(00000008,00278020,00000000,00000000,?,00278020,?), ref: 002785D3
                          • Part of subcall function 002785C7: HeapAlloc.KERNEL32(00000000,?,00278020,?), ref: 002785DA
                          • Part of subcall function 002785C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00278020,?), ref: 002785EB
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00278238
                        • _memset.LIBCMT ref: 0027824D
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0027826C
                        • GetLengthSid.ADVAPI32(?), ref: 0027827D
                        • GetAce.ADVAPI32(?,00000000,?), ref: 002782BA
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 002782D6
                        • GetLengthSid.ADVAPI32(?), ref: 002782F3
                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00278302
                        • HeapAlloc.KERNEL32(00000000), ref: 00278309
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0027832A
                        • CopySid.ADVAPI32(00000000), ref: 00278331
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00278362
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00278388
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0027839C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                        • String ID:
                        • API String ID: 3996160137-0
                        • Opcode ID: b4f616f35e03a20d12fe569403d403531432f3b6d1cde69cde122fbebfe54790
                        • Instruction ID: cdf05486b6c66ac471140a29db791694dcad0dd4d6dac939a322fee4b9bdafee
                        • Opcode Fuzzy Hash: b4f616f35e03a20d12fe569403d403531432f3b6d1cde69cde122fbebfe54790
                        • Instruction Fuzzy Hash: 8E61687195020AEFDF10CFA4DC48AEEBBB9FF05701F048169F919A6291DB359A25CB60
                        APIs
                          • Part of subcall function 002A0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029FE38,?,?), ref: 002A0EBC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002A0537
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 002A05D6
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 002A066E
                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 002A08AD
                        • RegCloseKey.ADVAPI32(00000000), ref: 002A08BA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                        • String ID:
                        • API String ID: 1240663315-0
                        • Opcode ID: c2c2e36fdd6b618eb0b3e368bd466100341ed0b63bcbef8dbe08aebf2457c906
                        • Instruction ID: 41f6d37ec1d3bd750d1fec12b2e7061ba83fb75ad13a5f1162b0e17f45aa885c
                        • Opcode Fuzzy Hash: c2c2e36fdd6b618eb0b3e368bd466100341ed0b63bcbef8dbe08aebf2457c906
                        • Instruction Fuzzy Hash: 99E17B30624211AFCB14DF69D885E2ABBE4EF89714F04886DF44ACB262DA34ED54CF91
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0D,$0D,$ERCP$Oa#$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-2260198032
                        • Opcode ID: 6547d38738e01a4bcf0760f92383ef7b660a6171d9f48967b505b9b4c854a248
                        • Instruction ID: 64c9ad31db88190384362d074c00f708e7aa776244e885baa314027117af939f
                        • Opcode Fuzzy Hash: 6547d38738e01a4bcf0760f92383ef7b660a6171d9f48967b505b9b4c854a248
                        • Instruction Fuzzy Hash: B7A2A0B0E2421ACBDF24DF58C9807ADB7B1BB54314F2482EAD855A7280D770AEE5CF50
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00280062
                        • GetAsyncKeyState.USER32(000000A0), ref: 002800E3
                        • GetKeyState.USER32(000000A0), ref: 002800FE
                        • GetAsyncKeyState.USER32(000000A1), ref: 00280118
                        • GetKeyState.USER32(000000A1), ref: 0028012D
                        • GetAsyncKeyState.USER32(00000011), ref: 00280145
                        • GetKeyState.USER32(00000011), ref: 00280157
                        • GetAsyncKeyState.USER32(00000012), ref: 0028016F
                        • GetKeyState.USER32(00000012), ref: 00280181
                        • GetAsyncKeyState.USER32(0000005B), ref: 00280199
                        • GetKeyState.USER32(0000005B), ref: 002801AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: fc9e14bd6ef350d6a061db313ab1f86286026ee0a77cc660ab2e5f499b8591c4
                        • Instruction ID: 171cc19a81583c15c65ddab0259771729331decda45681b0d28e34fc56a39fd5
                        • Opcode Fuzzy Hash: fc9e14bd6ef350d6a061db313ab1f86286026ee0a77cc660ab2e5f499b8591c4
                        • Instruction Fuzzy Hash: C341DE289157CB5EFFB06E6088983B5BEA0AF12350F44405AD5C9465C2DB949DECC792
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: 49c90f4b3ea0d2d7629ede012a4c59fd4dfde0813841110a60bc574d5060b781
                        • Instruction ID: ec6afd79cadbe84be3dd79aba88a227d486ac3d0dd3fc8717a71f18d1cc70812
                        • Opcode Fuzzy Hash: 49c90f4b3ea0d2d7629ede012a4c59fd4dfde0813841110a60bc574d5060b781
                        • Instruction Fuzzy Hash: E921A035620621AFDB10AFA0ED4DF6D7BA8EF05710F14802AF946DB2A1DB74AC11CF54
                        APIs
                          • Part of subcall function 002248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002248A1,?,?,002237C0,?), ref: 002248CE
                          • Part of subcall function 00284AD8: GetFileAttributesW.KERNEL32(?,0028374F), ref: 00284AD9
                        • FindFirstFileW.KERNEL32(?,?), ref: 002838E7
                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0028398F
                        • MoveFileW.KERNEL32(?,?), ref: 002839A2
                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 002839BF
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 002839E1
                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 002839FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 4002782344-1173974218
                        • Opcode ID: bee33ef104773f8bba8dda449f492c63724e2b7483e4abdda36405bf4176c784
                        • Instruction ID: a671baa60b43ae5e1db5083f59ff4ddc3e8a0ee60f8234f8e35344582a3862f0
                        • Opcode Fuzzy Hash: bee33ef104773f8bba8dda449f492c63724e2b7483e4abdda36405bf4176c784
                        • Instruction Fuzzy Hash: 59518E35816129AACF15FBE0EE929EDB7B8AF14300F644169E44277191EF706F29CF60
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0028F4CC
                        • Sleep.KERNEL32(0000000A), ref: 0028F4FC
                        • _wcscmp.LIBCMT ref: 0028F510
                        • _wcscmp.LIBCMT ref: 0028F52B
                        • FindNextFileW.KERNEL32(?,?), ref: 0028F5C9
                        • FindClose.KERNEL32(00000000), ref: 0028F5DF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                        • String ID: *.*
                        • API String ID: 713712311-438819550
                        • Opcode ID: cb24221dc48b7f79d7bbf6d2370bf2d031318e34d63bc7cf9c34ea724f7e6c21
                        • Instruction ID: ad42352dc7e71b0699d2949d04d9affc2cedce84bc633e761ad04e26d1de78fe
                        • Opcode Fuzzy Hash: cb24221dc48b7f79d7bbf6d2370bf2d031318e34d63bc7cf9c34ea724f7e6c21
                        • Instruction Fuzzy Hash: 5741C07582121AABCF50EFA0DD48AEEBBB4FF05310F544066E814A3291EB349E64CF90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID:
                        • API String ID: 4104443479-0
                        • Opcode ID: 7b0f1a676418fd9d26d2578f3848f21dd1ea6c555533c13b6ba8dd4dfe5ce7fb
                        • Instruction ID: 4ea674480ae1e2269d3599ac3ad28586c8a7b65e56c9ad2a17a73bc2fe51bfd2
                        • Opcode Fuzzy Hash: 7b0f1a676418fd9d26d2578f3848f21dd1ea6c555533c13b6ba8dd4dfe5ce7fb
                        • Instruction Fuzzy Hash: 2912AEB0A20619EFDF14CFA5D981AEEB3F5FF48304F108569E40AA7251EB35AD25CB50
                        APIs
                          • Part of subcall function 00240F36: std::exception::exception.LIBCMT ref: 00240F6C
                          • Part of subcall function 00240F36: __CxxThrowException@8.LIBCMT ref: 00240F81
                        • _memmove.LIBCMT ref: 002705AE
                        • _memmove.LIBCMT ref: 002706C3
                        • _memmove.LIBCMT ref: 0027076A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                        • String ID: yZ#
                        • API String ID: 1300846289-1179799137
                        • Opcode ID: c91bf47b097f77d8e5dfccbfdc0c9885ab92d60c15508837b5f85edbf1b38ea0
                        • Instruction ID: 791dc4be2b5b7935011bc454fb55b1d0fe19e57497e55cb60612e42d430086de
                        • Opcode Fuzzy Hash: c91bf47b097f77d8e5dfccbfdc0c9885ab92d60c15508837b5f85edbf1b38ea0
                        • Instruction Fuzzy Hash: 7902BEB0A20219DBDF08DF64D981AAEBBB5EF44300F55C069E80ADB255EB30DD65CF91
                        APIs
                          • Part of subcall function 00278AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00278AED
                          • Part of subcall function 00278AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00278B1A
                          • Part of subcall function 00278AA3: GetLastError.KERNEL32 ref: 00278B27
                        • ExitWindowsEx.USER32(?,00000000), ref: 002852A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $@$SeShutdownPrivilege
                        • API String ID: 2234035333-194228
                        • Opcode ID: 97ecd5cf7d5b1be1e1b8c080336af7aaa47a3d185dea20239f33f7b1945bb443
                        • Instruction ID: 6ab2729da46f944d0bbeeac53f8154d84ae9c9a2e7337330673bd7d3d260408f
                        • Opcode Fuzzy Hash: 97ecd5cf7d5b1be1e1b8c080336af7aaa47a3d185dea20239f33f7b1945bb443
                        • Instruction Fuzzy Hash: BE014C386B26266BF7283A78AC4BBB67258EB06741F240122FC07D10D6DEA01C204790
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __itow__swprintf
                        • String ID: Oa#
                        • API String ID: 674341424-1510357115
                        • Opcode ID: 4f8df1ca03b6c1b88be16e0558e79c49e66fc64402504995839fd3d2a2ad45a9
                        • Instruction ID: 998351eb48c3318a5e3e9335b0d85fff2616ed6c9abc66912769ce889e64ea3f
                        • Opcode Fuzzy Hash: 4f8df1ca03b6c1b88be16e0558e79c49e66fc64402504995839fd3d2a2ad45a9
                        • Instruction Fuzzy Hash: DB22ADB16283119FC724DF54D881B6BB7E4BF88304F50491DF89A97291DB70EA64CF92
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 002963F2
                        • WSAGetLastError.WSOCK32(00000000), ref: 00296401
                        • bind.WSOCK32(00000000,?,00000010), ref: 0029641D
                        • listen.WSOCK32(00000000,00000005), ref: 0029642C
                        • WSAGetLastError.WSOCK32(00000000), ref: 00296446
                        • closesocket.WSOCK32(00000000,00000000), ref: 0029645A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketlistensocket
                        • String ID:
                        • API String ID: 1279440585-0
                        • Opcode ID: 3ac51610d01970923ae418c364a4fab5e641ef569ad307c7dba2159c8ed51838
                        • Instruction ID: 9f684464883d3d6432b64210cf26e42bc2e89a1480c9659d1c1b689a671315c7
                        • Opcode Fuzzy Hash: 3ac51610d01970923ae418c364a4fab5e641ef569ad307c7dba2159c8ed51838
                        • Instruction Fuzzy Hash: 7B21E130610211AFDF20EFA4DD4AB2EB7E9EF49720F108169F85AA7391CB74AC51CB51
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 002219FA
                        • GetSysColor.USER32(0000000F), ref: 00221A4E
                        • SetBkColor.GDI32(?,00000000), ref: 00221A61
                          • Part of subcall function 00221290: DefDlgProcW.USER32(?,00000020,?), ref: 002212D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ColorProc$LongWindow
                        • String ID:
                        • API String ID: 3744519093-0
                        • Opcode ID: 3dbbc6f0f23f780ef5b26a76bb6cdb165b7bec9ab82ef10e7b3a6607353a13b5
                        • Instruction ID: d1d073db39b2d9c7e24cc135a6b41c96e5f094ef93c9bfbf426eb4ea814ff887
                        • Opcode Fuzzy Hash: 3dbbc6f0f23f780ef5b26a76bb6cdb165b7bec9ab82ef10e7b3a6607353a13b5
                        • Instruction Fuzzy Hash: A8A19B701315B6BFD739AEA87C49E7F355CDB6A346B240109F802D5191CEB68C30C6B5
                        APIs
                          • Part of subcall function 00297EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00297ECB
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 002968B4
                        • WSAGetLastError.WSOCK32(00000000), ref: 002968DD
                        • bind.WSOCK32(00000000,?,00000010), ref: 00296916
                        • WSAGetLastError.WSOCK32(00000000), ref: 00296923
                        • closesocket.WSOCK32(00000000,00000000), ref: 00296937
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 99427753-0
                        • Opcode ID: f5da5e0fea1c0c27aa856308b40fd2f885291278a45691f9424edf976bc4150a
                        • Instruction ID: 725bd130f3ec659e2e31049af5cad18a5a5d06f5e6b7bf4de44be15c85676deb
                        • Opcode Fuzzy Hash: f5da5e0fea1c0c27aa856308b40fd2f885291278a45691f9424edf976bc4150a
                        • Instruction Fuzzy Hash: 2541D975A20220AFEB10AFA4EC87F6E77E5DF08710F048158F95A9B3C2DA749D508B91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: ce4ab9122ce56bb16dea1bd537443bf8403e8b9b9337e021f6f19ad0e6dd93b3
                        • Instruction ID: 7cb194eff9e5edba65b4adb29561574df5f877a85ea134e18d64ac9c0bdfb3f9
                        • Opcode Fuzzy Hash: ce4ab9122ce56bb16dea1bd537443bf8403e8b9b9337e021f6f19ad0e6dd93b3
                        • Instruction Fuzzy Hash: CB11C831720A316FE7215F66EC48B2FB799FF4A722B044028F446D7251CF749C518A95
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 0028C4BE
                        • CoCreateInstance.OLE32(002B2D6C,00000000,00000001,002B2BDC,?), ref: 0028C4D6
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                        • CoUninitialize.OLE32 ref: 0028C743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_memmove
                        • String ID: .lnk
                        • API String ID: 2683427295-24824748
                        • Opcode ID: 6a4bd7e6085ff9a7d948bc40c76a841b356207eb730e463973877140661e5ca0
                        • Instruction ID: 866b06940ac974860815ec12b01fcf9cd53adb09df4c58a3c9e11e9e1981edd7
                        • Opcode Fuzzy Hash: 6a4bd7e6085ff9a7d948bc40c76a841b356207eb730e463973877140661e5ca0
                        • Instruction Fuzzy Hash: 35A13B71118315AFD700EF94D892EABB7ECEF85304F00496CF15697192EB70EA59CB62
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00261CB7,?), ref: 0029C112
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0029C124
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                        • API String ID: 2574300362-1816364905
                        • Opcode ID: 82da66ba92d9c6dac12c0efa9532cebac0c29c765ad9e05eec37bb0e45cb5f64
                        • Instruction ID: 3f4fe2a80df9eb7209e4fce26b93f72ce80987c0546d127a3024c4a673105efe
                        • Opcode Fuzzy Hash: 82da66ba92d9c6dac12c0efa9532cebac0c29c765ad9e05eec37bb0e45cb5f64
                        • Instruction Fuzzy Hash: F4E0C278220723CFDF605F65D808A4276E8EF0A349B508439EC8DC2250EB78C890CB24
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0029EF51
                        • Process32FirstW.KERNEL32(00000000,?), ref: 0029EF5F
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                        • Process32NextW.KERNEL32(00000000,?), ref: 0029F01F
                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0029F02E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                        • String ID:
                        • API String ID: 2576544623-0
                        • Opcode ID: 15f1fa955c589f0f9027fbf0305f5de80b1b2ccc5fe3b33ef6a5761d323bb0d5
                        • Instruction ID: 566ac01e82fda0400a48c2fb93c1cc43861e91b0e87796de4d2d46e080cc91cb
                        • Opcode Fuzzy Hash: 15f1fa955c589f0f9027fbf0305f5de80b1b2ccc5fe3b33ef6a5761d323bb0d5
                        • Instruction Fuzzy Hash: 17516E71518321AFD710EF64EC86E6BB7E8FF88710F10482DF49597251EB70A914CB92
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0027E93A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: 96ded2238f8f59ae738b8874cdb0de88cf7ba1c7bf3fb2d945fc4be9d59f0207
                        • Instruction ID: 2c32103a52fcfcd9835b397100643214c90295feb685f6af9b486b75ae348bc6
                        • Opcode Fuzzy Hash: 96ded2238f8f59ae738b8874cdb0de88cf7ba1c7bf3fb2d945fc4be9d59f0207
                        • Instruction Fuzzy Hash: 26323675A10605DFCB28CF29C48196AB7F0FF48320B16C5AEE59ADB3A1E770E951CB50
                        APIs
                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00291920,00000000), ref: 002924F7
                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0029252E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Internet$AvailableDataFileQueryRead
                        • String ID:
                        • API String ID: 599397726-0
                        • Opcode ID: fb7a957c78bac619ea6c7541943d07ca7950350ed6a68741e6eb35945586c23b
                        • Instruction ID: f180b612b6eb584f68f891b73e39b5083bb8e1fbe2c48e978a227e10bb7517f2
                        • Opcode Fuzzy Hash: fb7a957c78bac619ea6c7541943d07ca7950350ed6a68741e6eb35945586c23b
                        • Instruction Fuzzy Hash: AD41087552030AFFEF24DE95DC85EBFB7BCEB40324F50406EF605A6141DAB09E689A60
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0028B3CF
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0028B429
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0028B476
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: e57e5376df2fbda3408507e8cb05cd3e7586b44ca3eaa197a8dca553beab259d
                        • Instruction ID: 281cef032f83f7f326c98fa6d7e80b686af1870bf34ec51c0960f0440b16d830
                        • Opcode Fuzzy Hash: e57e5376df2fbda3408507e8cb05cd3e7586b44ca3eaa197a8dca553beab259d
                        • Instruction Fuzzy Hash: 75216035A10618EFCB00EFA5E885AADBBB8FF49310F1480A9E905AB351DB319955CF51
                        APIs
                          • Part of subcall function 00240F36: std::exception::exception.LIBCMT ref: 00240F6C
                          • Part of subcall function 00240F36: __CxxThrowException@8.LIBCMT ref: 00240F81
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00278AED
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00278B1A
                        • GetLastError.KERNEL32 ref: 00278B27
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                        • String ID:
                        • API String ID: 1922334811-0
                        • Opcode ID: 6b725ec89b5b46ff2a33ee47dcf84f3443eccf44e8800890c67e35fbd8c97078
                        • Instruction ID: 6300a55148fec1a0a0576550954b45399b8efeffd0fccc56e9c8ca9d8419838e
                        • Opcode Fuzzy Hash: 6b725ec89b5b46ff2a33ee47dcf84f3443eccf44e8800890c67e35fbd8c97078
                        • Instruction Fuzzy Hash: A311BFB1524205AFD7289F64ECC9D2BB7BCFB44314B21C16EF44993641EF70AC50CA60
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00284A31
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00284A48
                        • FreeSid.ADVAPI32(?), ref: 00284A58
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 3353e599f8b4f716250c2ddff0943970c9d6ba13be2a1f59d324ba91470cd9f6
                        • Instruction ID: 62dea7acc1294d3bf312f0d829d7b45509a05bc589f0d6eb8aa58489d83b0000
                        • Opcode Fuzzy Hash: 3353e599f8b4f716250c2ddff0943970c9d6ba13be2a1f59d324ba91470cd9f6
                        • Instruction Fuzzy Hash: B1F04975A5130DBFDF04DFF0DD89AAEBBBCEF08201F0044A9A901E2281E6746A048B50
                        APIs
                        • __time64.LIBCMT ref: 00288944
                          • Part of subcall function 0024537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00289017,00000000,?,?,?,?,002891C8,00000000,?), ref: 00245383
                          • Part of subcall function 0024537A: __aulldiv.LIBCMT ref: 002453A3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Time$FileSystem__aulldiv__time64
                        • String ID: 0e.
                        • API String ID: 2893107130-527871663
                        • Opcode ID: 13c8b8e086ba30228439d201f2a351f9f93b4a6b6601785d36cee9117c74ad41
                        • Instruction ID: f2d7aa6b60b0a63dbc5cb3295ee34bbd32a92c617245a413679baf597dc9bea0
                        • Opcode Fuzzy Hash: 13c8b8e086ba30228439d201f2a351f9f93b4a6b6601785d36cee9117c74ad41
                        • Instruction Fuzzy Hash: D421E436635610CBC729CF25D885A62B3E1EBA5310F688E6CD1E5CF2C0CA34B905CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0caa911734e7b1598e08152c1dc8cbcd7d2974d700819147a84a9aac9e974d24
                        • Instruction ID: e832a9652d8945674af3a884525fbf87571598ec7c5e5b6e7920c0816d3c479e
                        • Opcode Fuzzy Hash: 0caa911734e7b1598e08152c1dc8cbcd7d2974d700819147a84a9aac9e974d24
                        • Instruction Fuzzy Hash: 5B22DF70920226EFDF24DF94E480ABEB7B0FF14300F158169E856AB341E774ADA5DB91
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 0028C787
                        • FindClose.KERNEL32(00000000), ref: 0028C7B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 42c04c604be9d1472d616da3496471d400d07b2f46622c504672ac04bcf9b9f9
                        • Instruction ID: 9c1599768bb48dd4d82096ddfdc5d5580fdaf3c7e93ab433a49bcc984384e1a7
                        • Opcode Fuzzy Hash: 42c04c604be9d1472d616da3496471d400d07b2f46622c504672ac04bcf9b9f9
                        • Instruction Fuzzy Hash: 5611A1366206109FD710EF69D849A2AF7E8FF84320F10851EF9A9D7290DB70AC10CF91
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0029957D,?,002AFB84,?), ref: 0028A121
                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0029957D,?,002AFB84,?), ref: 0028A133
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 4d38106462094063b3898bc11d2a1e2312c9c1a340312d2d75ee9d58f954998b
                        • Instruction ID: 9ea18ba950867de6ed03f428f3be72c26c35acf3a74c56004f6b27494fb9d14b
                        • Opcode Fuzzy Hash: 4d38106462094063b3898bc11d2a1e2312c9c1a340312d2d75ee9d58f954998b
                        • Instruction Fuzzy Hash: 06F0E23511522DBBDB10AFA4DC4CFEA736CFF09362F004166B909D2180DA709910CFA1
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00278631), ref: 00278508
                        • CloseHandle.KERNEL32(?,?,00278631), ref: 0027851A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: 2281db37e0131ac95b27e0e072fcfc7dc377a42cc3fd7052e65e14ac7cc039d0
                        • Instruction ID: 58792200f9aec3e5d1e282db214ebc1bf09c720b0ffc4a2909a2d50b5095d51d
                        • Opcode Fuzzy Hash: 2281db37e0131ac95b27e0e072fcfc7dc377a42cc3fd7052e65e14ac7cc039d0
                        • Instruction Fuzzy Hash: 7AE04632024600AFEB252F61FC08D777BA9EB403107118829B59680830EF32ACA0DF50
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00248ED7,?,?,?,00000001), ref: 0024A2DA
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0024A2E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: b22de4b31e5334e4d80095ff8a45bd4739bf92b68c9e3cd3f5afbc837c6c8822
                        • Instruction ID: b7cc874f780bd806d4d3aac185dfec545841f66a461a3e9601a05e19b8b1bcf4
                        • Opcode Fuzzy Hash: b22de4b31e5334e4d80095ff8a45bd4739bf92b68c9e3cd3f5afbc837c6c8822
                        • Instruction Fuzzy Hash: CBB09231054248ABCF802BD1FD5DB883F68EB46AA2F4040A0FE0D84060CFA654508A91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ee84a043ae0dc89b2d39d9f8b43855d8d57259d0146dc125ccf710a08fc13e63
                        • Instruction ID: 2b30f30d87dd9405645f9600a5be5926d229c130459ece33beda127fe622b220
                        • Opcode Fuzzy Hash: ee84a043ae0dc89b2d39d9f8b43855d8d57259d0146dc125ccf710a08fc13e63
                        • Instruction Fuzzy Hash: 77321322D39F014DDB679A34D976336A288AFF73C8F15D737E819B59A6EB28C4834100
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 187b8e62ddd248ae54e50e8553184895a9b6ff8e2f0ed9dd75667e67d747c46e
                        • Instruction ID: 84f153febb6526c10a26d8b35594b98115755e2c7c3c2da6feebdcbc37e5e40c
                        • Opcode Fuzzy Hash: 187b8e62ddd248ae54e50e8553184895a9b6ff8e2f0ed9dd75667e67d747c46e
                        • Instruction Fuzzy Hash: EDB10030D2AF404DD32396399839336BA9CAFBB2C5F51D71BFC2674D62EB2285834141
                        APIs
                        • BlockInput.USER32(00000001), ref: 0029403A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: cd82b34e2f7606b7aca14ef77eacd9be71ccd7ca57eebad1bc079d457756c6c9
                        • Instruction ID: 0bcea9f1c04c264ece99f41fabaf012e6ce60410319043eeaafcce89ef8c3448
                        • Opcode Fuzzy Hash: cd82b34e2f7606b7aca14ef77eacd9be71ccd7ca57eebad1bc079d457756c6c9
                        • Instruction Fuzzy Hash: B3E04832224214AFD714AF99E405E56FBDCAF64764F008016FD49C7351DAB0E8518F90
                        APIs
                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00284D1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: mouse_event
                        • String ID:
                        • API String ID: 2434400541-0
                        • Opcode ID: 06cc7b8e86b1b6403ecd5a3b81a90c962a637206fbca3a740857954d76c1b17a
                        • Instruction ID: 08791e58b00bcfb13eef1f7a874d25d4ed727d946959edae17ef506e721f9ff0
                        • Opcode Fuzzy Hash: 06cc7b8e86b1b6403ecd5a3b81a90c962a637206fbca3a740857954d76c1b17a
                        • Instruction Fuzzy Hash: E3D05EAC1322073BFC2C3F209C1FB768208F304782FE4014A3A02860C5A8E86860A635
                        APIs
                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,002786B1), ref: 00278A93
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LogonUser
                        • String ID:
                        • API String ID: 1244722697-0
                        • Opcode ID: a171f091d7f0dc157497327be9c8746790c00852295ebd717306679e9a7b4313
                        • Instruction ID: 02cd9f60955bdb8cebf36a94d580f3c453d99ed19d558e3b2546c681b8267b1e
                        • Opcode Fuzzy Hash: a171f091d7f0dc157497327be9c8746790c00852295ebd717306679e9a7b4313
                        • Instruction Fuzzy Hash: 68D05E322A050EABEF018EA4ED05EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00262171
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: 4d771b57cf188e4b9c212e3c51b505a3e38c1ea73504993da037987109865221
                        • Instruction ID: 00ea6da7d744454cc05412ab11801d97bc0f47433b50da71124f9f9a668e01ac
                        • Opcode Fuzzy Hash: 4d771b57cf188e4b9c212e3c51b505a3e38c1ea73504993da037987109865221
                        • Instruction Fuzzy Hash: 79C04CF1811509DBCB05DBD0DA88DEE77BCAB04304F144055A141F2140DB749B54CB71
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0024A2AA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 05cf3e9e2f18522e0a08a53bc517562030564026c753fc19834728f37967e3b8
                        • Instruction ID: a261f84168f0aacd18aae51c3e6d5212deb44b0a8f83587bfa15c66fd7a32f68
                        • Opcode Fuzzy Hash: 05cf3e9e2f18522e0a08a53bc517562030564026c753fc19834728f37967e3b8
                        • Instruction Fuzzy Hash: 5BA0113000020CAB8F002B82FC08888BFACEA022A0B0080A0FC0C800228B32A8208A80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e67ca7ace6ba025742a870e5414d6c759fb157f1850ec8ebb57713b7845da37e
                        • Instruction ID: c9f998e3b5b5395d717858131eedbc14ef140b0c2d39ae7906be8de21a2b05c9
                        • Opcode Fuzzy Hash: e67ca7ace6ba025742a870e5414d6c759fb157f1850ec8ebb57713b7845da37e
                        • Instruction Fuzzy Hash: 9C22D3B09347678BDF288E28C49467CF7A2FB01308F68846AE859DF591DBB49DA1C650
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction ID: 96e0ea622f540c7ccf52dac1c2f5fbb3e947c6fb1c37025a22e7785b4c8d34c7
                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                        • Instruction Fuzzy Hash: DDC1953222519349DB2D8A3A843413EFEA15AA27B239B075DF4B3DB4D4EF10C57DDA20
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction ID: 16824160fad1194b4655bd35a2855b1dd80c0f5f83503909a86551d446c162fe
                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                        • Instruction Fuzzy Hash: 23C185322251A349DB2D4A3A843413EBFA15AA27B239B075DF8B2DB5C4EF10C57DD620
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction ID: 92cd4e4ad86d45d1ad92e00e17f5e6a286161efc58eea21cc6ac88df1007f561
                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                        • Instruction Fuzzy Hash: 7241D571D1051CEBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction ID: ac81a2370ff459f1bd1b08d803a75857a7353703d26d4d94218e274f6a4292d5
                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                        • Instruction Fuzzy Hash: B60180B9E10209EFCB44DF98D6949AEF7B5FB88210B208599E919A7701D730AE41DB81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction ID: 9bb54af2242bba8068c13fef52c45e2b9357c7c5c689760d7184312a5f43e861
                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                        • Instruction Fuzzy Hash: F1018078E10209EFCB48DF98D6949AEF7B5FB88210B208599D919A7301D730AE41DB81
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664843641.000000000123C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0123C000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_123c000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00297970
                        • DeleteObject.GDI32(00000000), ref: 00297982
                        • DestroyWindow.USER32 ref: 00297990
                        • GetDesktopWindow.USER32 ref: 002979AA
                        • GetWindowRect.USER32(00000000), ref: 002979B1
                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00297AF2
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00297B02
                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297B4A
                        • GetClientRect.USER32(00000000,?), ref: 00297B56
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00297B90
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297BB2
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297BC5
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297BD0
                        • GlobalLock.KERNEL32(00000000), ref: 00297BD9
                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297BE8
                        • GlobalUnlock.KERNEL32(00000000), ref: 00297BF1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297BF8
                        • GlobalFree.KERNEL32(00000000), ref: 00297C03
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297C15
                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,002B2CAC,00000000), ref: 00297C2B
                        • GlobalFree.KERNEL32(00000000), ref: 00297C3B
                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00297C61
                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00297C80
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297CA2
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00297E8F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: 9371f96e185591d8ee684714a4fbee4219432585adbb0a40d4a9961ea3fa919b
                        • Instruction ID: 818b2e9814ea7d60431c1c9ea8ae1ba55cef7f416d43ba342a7a3b2280224a56
                        • Opcode Fuzzy Hash: 9371f96e185591d8ee684714a4fbee4219432585adbb0a40d4a9961ea3fa919b
                        • Instruction Fuzzy Hash: EC027971920215EFDF14DFA4ED89EAEBBB9EF49310F008159F915AB2A1CB349D50CB60
                        APIs
                        • CharUpperBuffW.USER32(?,?,002AF910), ref: 002A3690
                        • IsWindowVisible.USER32(?), ref: 002A36B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharUpperVisibleWindow
                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                        • API String ID: 4105515805-45149045
                        • Opcode ID: b5b66d0cc3ce2047b58062f7496954e2769eefbf2e57faced75cd0dcec326325
                        • Instruction ID: ecff4acf29d10b04fea4eb8e1e214d7f5b7c1f6c01f060ddaaeb3027da4fdbc6
                        • Opcode Fuzzy Hash: b5b66d0cc3ce2047b58062f7496954e2769eefbf2e57faced75cd0dcec326325
                        • Instruction Fuzzy Hash: 57D181302343119BCB14EF50C4D1A6AB7A5AF96750F148859F8865B3A3CF71DEAACF81
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 002AA662
                        • GetSysColorBrush.USER32(0000000F), ref: 002AA693
                        • GetSysColor.USER32(0000000F), ref: 002AA69F
                        • SetBkColor.GDI32(?,000000FF), ref: 002AA6B9
                        • SelectObject.GDI32(?,00000000), ref: 002AA6C8
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 002AA6F3
                        • GetSysColor.USER32(00000010), ref: 002AA6FB
                        • CreateSolidBrush.GDI32(00000000), ref: 002AA702
                        • FrameRect.USER32(?,?,00000000), ref: 002AA711
                        • DeleteObject.GDI32(00000000), ref: 002AA718
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 002AA763
                        • FillRect.USER32(?,?,00000000), ref: 002AA795
                        • GetWindowLongW.USER32(?,000000F0), ref: 002AA7C0
                          • Part of subcall function 002AA8FC: GetSysColor.USER32(00000012), ref: 002AA935
                          • Part of subcall function 002AA8FC: SetTextColor.GDI32(?,?), ref: 002AA939
                          • Part of subcall function 002AA8FC: GetSysColorBrush.USER32(0000000F), ref: 002AA94F
                          • Part of subcall function 002AA8FC: GetSysColor.USER32(0000000F), ref: 002AA95A
                          • Part of subcall function 002AA8FC: GetSysColor.USER32(00000011), ref: 002AA977
                          • Part of subcall function 002AA8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 002AA985
                          • Part of subcall function 002AA8FC: SelectObject.GDI32(?,00000000), ref: 002AA996
                          • Part of subcall function 002AA8FC: SetBkColor.GDI32(?,00000000), ref: 002AA99F
                          • Part of subcall function 002AA8FC: SelectObject.GDI32(?,?), ref: 002AA9AC
                          • Part of subcall function 002AA8FC: InflateRect.USER32(?,000000FF,000000FF), ref: 002AA9CB
                          • Part of subcall function 002AA8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002AA9E2
                          • Part of subcall function 002AA8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 002AA9F7
                          • Part of subcall function 002AA8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 002AAA1F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                        • String ID:
                        • API String ID: 3521893082-0
                        • Opcode ID: bf0e98ccee95de9e4222e735e4ad5d7e705b31dec3aaea66fa17e776d830f253
                        • Instruction ID: 0d109e759a6caa93b3d22254a3d1f3473a71c4f977d474a9568d6f632bbebd4c
                        • Opcode Fuzzy Hash: bf0e98ccee95de9e4222e735e4ad5d7e705b31dec3aaea66fa17e776d830f253
                        • Instruction Fuzzy Hash: 28917E71418301EFCB509FA4ED4CA5BBBA9FF8A321F100B29F5A2961A0DB75D944CF52
                        APIs
                        • DestroyWindow.USER32(?,?,?), ref: 00222CA2
                        • DeleteObject.GDI32(00000000), ref: 00222CE8
                        • DeleteObject.GDI32(00000000), ref: 00222CF3
                        • DestroyIcon.USER32(00000000,?,?,?), ref: 00222CFE
                        • DestroyWindow.USER32(00000000,?,?,?), ref: 00222D09
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 0025C5BB
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0025C5F4
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0025CA1D
                          • Part of subcall function 00221B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00222036,?,00000000,?,?,?,?,002216CB,00000000,?), ref: 00221B9A
                        • SendMessageW.USER32(?,00001053), ref: 0025CA5A
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0025CA71
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0025CA87
                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0025CA92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 464785882-4108050209
                        • Opcode ID: a8e6f8a61d2eb0cda6e80c7f6b646ab4a2df23f5d10abc5c915845b8fb079a3e
                        • Instruction ID: 19fd8eed2124734bbe9fdeb3a175a44105b3ee0b804aea91074732dc2874caf1
                        • Opcode Fuzzy Hash: a8e6f8a61d2eb0cda6e80c7f6b646ab4a2df23f5d10abc5c915845b8fb079a3e
                        • Instruction Fuzzy Hash: 7412C030520212EFCB11CF24D888BA9B7E5FF09311F644569F895DB262DB31E869CF94
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 002975F3
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 002976B2
                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 002976F0
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00297702
                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00297748
                        • GetClientRect.USER32(00000000,?), ref: 00297754
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00297798
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 002977A7
                        • GetStockObject.GDI32(00000011), ref: 002977B7
                        • SelectObject.GDI32(00000000,00000000), ref: 002977BB
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 002977CB
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002977D4
                        • DeleteDC.GDI32(00000000), ref: 002977DD
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00297809
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00297820
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 0029785B
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0029786F
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00297880
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 002978B0
                        • GetStockObject.GDI32(00000011), ref: 002978BB
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002978C6
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 002978D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 5f455d9638c6067f009f4614550b7e3cab9016c501020d5ca889751f1dbfd7e2
                        • Instruction ID: e4f39d71161b3e98a2c6ae79caf3a0e9347c5f69565422dd5274bb6c5ad972f1
                        • Opcode Fuzzy Hash: 5f455d9638c6067f009f4614550b7e3cab9016c501020d5ca889751f1dbfd7e2
                        • Instruction Fuzzy Hash: 86A19271A60615BFEB14DFA4ED4AFAE7BB9EB05714F004114FA14AB2E0CB74AD10CB64
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0028ADAA
                        • GetDriveTypeW.KERNEL32(?,002AFAC0,?,\\.\,002AF910), ref: 0028AE87
                        • SetErrorMode.KERNEL32(00000000,002AFAC0,?,\\.\,002AF910), ref: 0028AFE5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: cae12095dcb372e25a1c8826e560e3d201f774d3c19a3d606b6129eb612437f9
                        • Instruction ID: add6217bc4f596b4f20941ff4e069f01dddbd99fdbd55c19758b32450d8be17d
                        • Opcode Fuzzy Hash: cae12095dcb372e25a1c8826e560e3d201f774d3c19a3d606b6129eb612437f9
                        • Instruction Fuzzy Hash: 6151A4B867A605ABEB00FF50C982879B3B0AB157047204457FA06A76D0CF729D72DF83
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 1038674560-86951937
                        • Opcode ID: 1d16d801992bdfd27b7e07976c8844558925a16c965add0b21a8db9e8a9f9a34
                        • Instruction ID: dfbbc9ee8a4d56956bdb45d17a72a82abbdc0ddeede061c0b7b356ea856151d5
                        • Opcode Fuzzy Hash: 1d16d801992bdfd27b7e07976c8844558925a16c965add0b21a8db9e8a9f9a34
                        • Instruction Fuzzy Hash: 0B815D71634322BBCF24AFA1DC86FAE7368AF15754F044020FD45AA192EB70DB75CA94
                        APIs
                        • GetSysColor.USER32(00000012), ref: 002AA935
                        • SetTextColor.GDI32(?,?), ref: 002AA939
                        • GetSysColorBrush.USER32(0000000F), ref: 002AA94F
                        • GetSysColor.USER32(0000000F), ref: 002AA95A
                        • CreateSolidBrush.GDI32(?), ref: 002AA95F
                        • GetSysColor.USER32(00000011), ref: 002AA977
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 002AA985
                        • SelectObject.GDI32(?,00000000), ref: 002AA996
                        • SetBkColor.GDI32(?,00000000), ref: 002AA99F
                        • SelectObject.GDI32(?,?), ref: 002AA9AC
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 002AA9CB
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 002AA9E2
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 002AA9F7
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 002AAA1F
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 002AAA46
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 002AAA64
                        • DrawFocusRect.USER32(?,?), ref: 002AAA6F
                        • GetSysColor.USER32(00000011), ref: 002AAA7D
                        • SetTextColor.GDI32(?,00000000), ref: 002AAA85
                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 002AAA99
                        • SelectObject.GDI32(?,002AA62C), ref: 002AAAB0
                        • DeleteObject.GDI32(?), ref: 002AAABB
                        • SelectObject.GDI32(?,?), ref: 002AAAC1
                        • DeleteObject.GDI32(?), ref: 002AAAC6
                        • SetTextColor.GDI32(?,?), ref: 002AAACC
                        • SetBkColor.GDI32(?,?), ref: 002AAAD6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 92ceb8d6c8b23864a5dbf9ead1686db94223dc3e015f7d67e0524886768bd7de
                        • Instruction ID: 7cc718d0390e39f041587dab093f475c821ab90e9eaec6080ed4a940b7533b58
                        • Opcode Fuzzy Hash: 92ceb8d6c8b23864a5dbf9ead1686db94223dc3e015f7d67e0524886768bd7de
                        • Instruction Fuzzy Hash: BD516D71900209FFDF509FA4ED48EAEBBB9EF09320F114225F915AB2A1DB759950CF90
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 002A8AF3
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A8B04
                        • CharNextW.USER32(0000014E), ref: 002A8B33
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 002A8B74
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 002A8B8A
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A8B9B
                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 002A8BB8
                        • SetWindowTextW.USER32(?,0000014E), ref: 002A8C0A
                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 002A8C20
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 002A8C51
                        • _memset.LIBCMT ref: 002A8C76
                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 002A8CBF
                        • _memset.LIBCMT ref: 002A8D1E
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 002A8D48
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 002A8DA0
                        • SendMessageW.USER32(?,0000133D,?,?), ref: 002A8E4D
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 002A8E6F
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 002A8EB9
                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 002A8EE6
                        • DrawMenuBar.USER32(?), ref: 002A8EF5
                        • SetWindowTextW.USER32(?,0000014E), ref: 002A8F1D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                        • String ID: 0
                        • API String ID: 1073566785-4108050209
                        • Opcode ID: 5282f2a2f97fa85711ca5a6bc9448159180bd7aadfebd807f7ddee1c788f7185
                        • Instruction ID: 2572be38a4a4f05a51af2e1e93c91329bb27850d2570401e14d44e22dac23ed5
                        • Opcode Fuzzy Hash: 5282f2a2f97fa85711ca5a6bc9448159180bd7aadfebd807f7ddee1c788f7185
                        • Instruction Fuzzy Hash: D6E1A170920219AFDF209F60CC88EEE7BB9FF06750F508156F9159A291DF7489A4CF60
                        APIs
                        • GetCursorPos.USER32(?), ref: 002A4A33
                        • GetDesktopWindow.USER32 ref: 002A4A48
                        • GetWindowRect.USER32(00000000), ref: 002A4A4F
                        • GetWindowLongW.USER32(?,000000F0), ref: 002A4AB1
                        • DestroyWindow.USER32(?), ref: 002A4ADD
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 002A4B06
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002A4B24
                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 002A4B4A
                        • SendMessageW.USER32(?,00000421,?,?), ref: 002A4B5F
                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 002A4B72
                        • IsWindowVisible.USER32(?), ref: 002A4B92
                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 002A4BAD
                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 002A4BC1
                        • GetWindowRect.USER32(?,?), ref: 002A4BD9
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 002A4BFF
                        • GetMonitorInfoW.USER32(00000000,?), ref: 002A4C19
                        • CopyRect.USER32(?,?), ref: 002A4C30
                        • SendMessageW.USER32(?,00000412,00000000), ref: 002A4C9B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 6a1e899ca5114bea9365bab359c5a7925c72c8302e677ceb7cc4cfe658f5a1e9
                        • Instruction ID: 13b474a84014acd3ec1fcda8a5b1e2fc4d2c5139c7e41f628c721de27ebe4598
                        • Opcode Fuzzy Hash: 6a1e899ca5114bea9365bab359c5a7925c72c8302e677ceb7cc4cfe658f5a1e9
                        • Instruction Fuzzy Hash: E3B1BC70614301AFDB44EF64D988B6ABBE4FF89710F00891DF5999B291DBB0EC14CB95
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002228BC
                        • GetSystemMetrics.USER32(00000007), ref: 002228C4
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 002228EF
                        • GetSystemMetrics.USER32(00000008), ref: 002228F7
                        • GetSystemMetrics.USER32(00000004), ref: 0022291C
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00222939
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00222949
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0022297C
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00222990
                        • GetClientRect.USER32(00000000,000000FF), ref: 002229AE
                        • GetStockObject.GDI32(00000011), ref: 002229CA
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 002229D5
                          • Part of subcall function 00222344: GetCursorPos.USER32(?), ref: 00222357
                          • Part of subcall function 00222344: ScreenToClient.USER32(002E57B0,?), ref: 00222374
                          • Part of subcall function 00222344: GetAsyncKeyState.USER32(00000001), ref: 00222399
                          • Part of subcall function 00222344: GetAsyncKeyState.USER32(00000002), ref: 002223A7
                        • SetTimer.USER32(00000000,00000000,00000028,00221256), ref: 002229FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: c07636513fa54c80787d57775c4d7313f89e609a92451b564eab26f7e6d17384
                        • Instruction ID: d2060401708def2f94ad1081d4177e8c90672f5845436259b91b94606a1975b1
                        • Opcode Fuzzy Hash: c07636513fa54c80787d57775c4d7313f89e609a92451b564eab26f7e6d17384
                        • Instruction Fuzzy Hash: 47B18F71A2021AEFDB14DFE8ED89BAD7BA4FB08315F104229FA15D6290DB74D864CB50
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 0027A885
                        • __swprintf.LIBCMT ref: 0027A926
                        • _wcscmp.LIBCMT ref: 0027A939
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0027A98E
                        • _wcscmp.LIBCMT ref: 0027A9CA
                        • GetClassNameW.USER32(?,?,00000400), ref: 0027AA01
                        • GetDlgCtrlID.USER32(?), ref: 0027AA53
                        • GetWindowRect.USER32(?,?), ref: 0027AA89
                        • GetParent.USER32(?), ref: 0027AAA7
                        • ScreenToClient.USER32(00000000), ref: 0027AAAE
                        • GetClassNameW.USER32(?,?,00000100), ref: 0027AB28
                        • _wcscmp.LIBCMT ref: 0027AB3C
                        • GetWindowTextW.USER32(?,?,00000400), ref: 0027AB62
                        • _wcscmp.LIBCMT ref: 0027AB76
                          • Part of subcall function 002437AC: _iswctype.LIBCMT ref: 002437B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                        • String ID: %s%u
                        • API String ID: 3744389584-679674701
                        • Opcode ID: 7ebd2717ca0ee3ccad7139cda53b07deb293ee6b959736a64dfbb09fb126b858
                        • Instruction ID: 6a9f27f8e9e12f8fd5aca10c48559c45c105cd287fd746b0790426ad20481c81
                        • Opcode Fuzzy Hash: 7ebd2717ca0ee3ccad7139cda53b07deb293ee6b959736a64dfbb09fb126b858
                        • Instruction Fuzzy Hash: 76A1C171224207AFD718DF64C884BAEF7E9FF94324F108529F99D82190DB30E965CB92
                        APIs
                        • GetClassNameW.USER32(00000008,?,00000400), ref: 0027B1DA
                        • _wcscmp.LIBCMT ref: 0027B1EB
                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 0027B213
                        • CharUpperBuffW.USER32(?,00000000), ref: 0027B230
                        • _wcscmp.LIBCMT ref: 0027B24E
                        • _wcsstr.LIBCMT ref: 0027B25F
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0027B297
                        • _wcscmp.LIBCMT ref: 0027B2A7
                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 0027B2CE
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 0027B317
                        • _wcscmp.LIBCMT ref: 0027B327
                        • GetClassNameW.USER32(00000010,?,00000400), ref: 0027B34F
                        • GetWindowRect.USER32(00000004,?), ref: 0027B3B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                        • String ID: @$ThumbnailClass
                        • API String ID: 1788623398-1539354611
                        • Opcode ID: ef1087dd3e9564e549ad7cdbe09e281dc25e9003da92f0bbbc38c2ba91c75b69
                        • Instruction ID: 6c66ec2c20babb508b076226ef782915c57504d3ad735bbda38ac4cb262d76e7
                        • Opcode Fuzzy Hash: ef1087dd3e9564e549ad7cdbe09e281dc25e9003da92f0bbbc38c2ba91c75b69
                        • Instruction Fuzzy Hash: 6781C0710283069FDB06DF10C995FAA7BE8EF44314F04C4AAFD899A0A6DB34DD65CB61
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • DragQueryPoint.SHELL32(?,?), ref: 002AC691
                          • Part of subcall function 002AAB69: ClientToScreen.USER32(?,?), ref: 002AAB92
                          • Part of subcall function 002AAB69: GetWindowRect.USER32(?,?), ref: 002AAC08
                          • Part of subcall function 002AAB69: PtInRect.USER32(?,?,002AC07E), ref: 002AAC18
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 002AC6FA
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 002AC705
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 002AC728
                        • _wcscat.LIBCMT ref: 002AC758
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 002AC76F
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 002AC788
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 002AC79F
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 002AC7C1
                        • DragFinish.SHELL32(?), ref: 002AC7C8
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 002AC8BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb.
                        • API String ID: 169749273-1174233046
                        • Opcode ID: 4f7659002a7f29bc8c7c2f9f7d14d450a3d4aded0c68409df777fb074376f732
                        • Instruction ID: 057cf1355b7a44122325f9e4a6810b80522ecfe26828f990fcb80192f1508a76
                        • Opcode Fuzzy Hash: 4f7659002a7f29bc8c7c2f9f7d14d450a3d4aded0c68409df777fb074376f732
                        • Instruction Fuzzy Hash: 04615E71118311AFC701DFA0EC89D9BBBE8FF89710F10092EF695962A1DB709959CF92
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                        • API String ID: 1038674560-1810252412
                        • Opcode ID: 2ce45414c938f7d7b44ec5c4a356524ba9d3ef520995af591ddea86bb52efdfd
                        • Instruction ID: 399cf6b16318c450d4ce7b1515936d9421b3a96bdcc82794a97e777c08fa750b
                        • Opcode Fuzzy Hash: 2ce45414c938f7d7b44ec5c4a356524ba9d3ef520995af591ddea86bb52efdfd
                        • Instruction Fuzzy Hash: 5531D030A7C226B6DA25EAA0DC53FAF73A49F21710F60451AB419711D2FFB16F34CA50
                        APIs
                        • LoadIconW.USER32(00000063), ref: 0027C2D3
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0027C2E5
                        • SetWindowTextW.USER32(?,?), ref: 0027C2FC
                        • GetDlgItem.USER32(?,000003EA), ref: 0027C311
                        • SetWindowTextW.USER32(00000000,?), ref: 0027C317
                        • GetDlgItem.USER32(?,000003E9), ref: 0027C327
                        • SetWindowTextW.USER32(00000000,?), ref: 0027C32D
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0027C34E
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0027C368
                        • GetWindowRect.USER32(?,?), ref: 0027C371
                        • SetWindowTextW.USER32(?,?), ref: 0027C3DC
                        • GetDesktopWindow.USER32 ref: 0027C3E2
                        • GetWindowRect.USER32(00000000), ref: 0027C3E9
                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0027C435
                        • GetClientRect.USER32(?,?), ref: 0027C442
                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0027C467
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0027C492
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                        • String ID:
                        • API String ID: 3869813825-0
                        • Opcode ID: 526e02d4025a599bac03f14a077e25d7021bc635a9a37c80df9988f368798fdb
                        • Instruction ID: 30bb236de2add41f6afd262a20857a43cb2c2757f0894a36958ea3c38457e57a
                        • Opcode Fuzzy Hash: 526e02d4025a599bac03f14a077e25d7021bc635a9a37c80df9988f368798fdb
                        • Instruction Fuzzy Hash: D3513D3190070AAFDB209FB8DE89B6EBBB5FF04705F10852CE656A25A0DB74A954CB50
                        APIs
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00295129
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00295134
                        • LoadCursorW.USER32(00000000,00007F03), ref: 0029513F
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0029514A
                        • LoadCursorW.USER32(00000000,00007F01), ref: 00295155
                        • LoadCursorW.USER32(00000000,00007F81), ref: 00295160
                        • LoadCursorW.USER32(00000000,00007F88), ref: 0029516B
                        • LoadCursorW.USER32(00000000,00007F80), ref: 00295176
                        • LoadCursorW.USER32(00000000,00007F86), ref: 00295181
                        • LoadCursorW.USER32(00000000,00007F83), ref: 0029518C
                        • LoadCursorW.USER32(00000000,00007F85), ref: 00295197
                        • LoadCursorW.USER32(00000000,00007F82), ref: 002951A2
                        • LoadCursorW.USER32(00000000,00007F84), ref: 002951AD
                        • LoadCursorW.USER32(00000000,00007F04), ref: 002951B8
                        • LoadCursorW.USER32(00000000,00007F02), ref: 002951C3
                        • LoadCursorW.USER32(00000000,00007F89), ref: 002951CE
                        • GetCursorInfo.USER32(?), ref: 002951DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Cursor$Load$Info
                        • String ID:
                        • API String ID: 2577412497-0
                        • Opcode ID: 92077c04a9795ba149fdb7ef99c7ce39560739c9862e00c87875d7337dcaad28
                        • Instruction ID: 58bbc190147dbc7d71d0ec4629b9707abde929145fb616189bac31acce2c2788
                        • Opcode Fuzzy Hash: 92077c04a9795ba149fdb7ef99c7ce39560739c9862e00c87875d7337dcaad28
                        • Instruction Fuzzy Hash: CF3107B0E5832A6ADF109FB69C8995FFEE8FF04750F50453AE50DE7280DA7865008F91
                        APIs
                        • _memset.LIBCMT ref: 002AA28B
                        • DestroyWindow.USER32(?,?), ref: 002AA305
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 002AA37F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 002AA3A1
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002AA3B4
                        • DestroyWindow.USER32(00000000), ref: 002AA3D6
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00220000,00000000), ref: 002AA40D
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 002AA426
                        • GetDesktopWindow.USER32 ref: 002AA43F
                        • GetWindowRect.USER32(00000000), ref: 002AA446
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 002AA45E
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 002AA476
                          • Part of subcall function 002225DB: GetWindowLongW.USER32(?,000000EB), ref: 002225EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                        • String ID: 0$tooltips_class32
                        • API String ID: 1297703922-3619404913
                        • Opcode ID: 7ee64a23f8a40731b2b6edc19ce8565d1db6694378bae642ff46a9d983989d50
                        • Instruction ID: 8c1fe85ca4d01f1fd73f631a47d57667f4580e9eb01a885a0f51a1b9e38a43a4
                        • Opcode Fuzzy Hash: 7ee64a23f8a40731b2b6edc19ce8565d1db6694378bae642ff46a9d983989d50
                        • Instruction Fuzzy Hash: 2C719B70160645AFDB20CF28DC48F6677F9EF8A704F04051DF9868B2A0DBB4A965CF62
                        APIs
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 002AB8E8
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,002A6B43,?), ref: 002AB944
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002AB97D
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 002AB9C0
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 002AB9F7
                        • FreeLibrary.KERNEL32(?), ref: 002ABA03
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 002ABA13
                        • DestroyIcon.USER32(?), ref: 002ABA22
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 002ABA3F
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 002ABA4B
                          • Part of subcall function 0024307D: __wcsicmp_l.LIBCMT ref: 00243106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                        • String ID: .dll$.exe$.icl$Ck*
                        • API String ID: 1212759294-468209006
                        • Opcode ID: ab50c30620441eebe4b6744423cfc400302eb193fbe7877edb88081875c81547
                        • Instruction ID: 8400fdbf1f01342bf5be55ec5858f49197eb71deeace0e2f310e805cb39714cb
                        • Opcode Fuzzy Hash: ab50c30620441eebe4b6744423cfc400302eb193fbe7877edb88081875c81547
                        • Instruction Fuzzy Hash: 6961207192061ABFEB25CF64DC45BBA77A8EF0A710F10411AF915D60C2DF7499A0CBA0
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 002A448D
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002A44D8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharMessageSendUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 3974292440-4258414348
                        • Opcode ID: 43b2351a965f2937ad4edaa3ad27e4fab4f50b41f80038b00336192692d96521
                        • Instruction ID: e5153a1758dd933ec756c8b65818887fcda677cb9fc921611e63886374cefd42
                        • Opcode Fuzzy Hash: 43b2351a965f2937ad4edaa3ad27e4fab4f50b41f80038b00336192692d96521
                        • Instruction Fuzzy Hash: C391A0302247119FCB14FF50C891A69B7A5AF85710F14885DF8965B3A2CF71EDAACF81
                        APIs
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • CharLowerBuffW.USER32(?,?), ref: 0028A455
                        • GetDriveTypeW.KERNEL32 ref: 0028A4A2
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0028A4EA
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0028A521
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0028A54F
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 2698844021-4113822522
                        • Opcode ID: fa7f8327c86b91fe48c1b4cd3e7a91ec4bd9ae0fb9e62ff9a29bae98b1504ebf
                        • Instruction ID: c4cfefd14fd012f16872b94697fbf9630844daccd17874d38a6fb22d691f0318
                        • Opcode Fuzzy Hash: fa7f8327c86b91fe48c1b4cd3e7a91ec4bd9ae0fb9e62ff9a29bae98b1504ebf
                        • Instruction Fuzzy Hash: 7B518C71528315AFC700EF20D89186AB7E4FF84718F10896EF886572A1DB31EE26CF42
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                        • String ID:
                        • API String ID: 884005220-0
                        • Opcode ID: 22847ad73d19859bb69e23f49b5f97466aa03b50588a317e3013c3bb23acd30e
                        • Instruction ID: 08edabc98908d0f95417ca20c0d33916d18ea8c6da7b919451215bda57b85172
                        • Opcode Fuzzy Hash: 22847ad73d19859bb69e23f49b5f97466aa03b50588a317e3013c3bb23acd30e
                        • Instruction Fuzzy Hash: 7761F472930212EFDB249F28D94676E77A8EF10327F10431AEC059B181DB74D968CB9A
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 002ABA8A
                        • GetFileSize.KERNEL32(00000000,00000000), ref: 002ABAA1
                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 002ABAAC
                        • CloseHandle.KERNEL32(00000000), ref: 002ABAB9
                        • GlobalLock.KERNEL32(00000000), ref: 002ABAC2
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 002ABAD1
                        • GlobalUnlock.KERNEL32(00000000), ref: 002ABADA
                        • CloseHandle.KERNEL32(00000000), ref: 002ABAE1
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 002ABAF2
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,002B2CAC,?), ref: 002ABB0B
                        • GlobalFree.KERNEL32(00000000), ref: 002ABB1B
                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 002ABB3F
                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 002ABB6A
                        • DeleteObject.GDI32(00000000), ref: 002ABB92
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 002ABBA8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: 536fe5a79b1db5a6fad0e9495dfa4cbe4462bae84c1879c946e01047bc60e2af
                        • Instruction ID: 4886c2c15a651a103bd2b5813664b3be397f480476c60637b803384077cd4811
                        • Opcode Fuzzy Hash: 536fe5a79b1db5a6fad0e9495dfa4cbe4462bae84c1879c946e01047bc60e2af
                        • Instruction Fuzzy Hash: 78416A35600209EFCB618FA5ED8CEAA7BB8EF8A711F104068F909D7261DB349D10DB60
                        APIs
                        • __wsplitpath.LIBCMT ref: 0028DA9C
                        • _wcscat.LIBCMT ref: 0028DAB4
                        • _wcscat.LIBCMT ref: 0028DAC6
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0028DADB
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0028DAEF
                        • GetFileAttributesW.KERNEL32(?), ref: 0028DB07
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 0028DB21
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0028DB33
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                        • String ID: *.*
                        • API String ID: 34673085-438819550
                        • Opcode ID: e2fcccaed64f7689b42bf789c5adfb779a441503479d1b190cd4dd274ff91432
                        • Instruction ID: f6ecd6544c0c265082b29a40fa4fbacf9c794e34a6d2148dcd87149493b4c96d
                        • Opcode Fuzzy Hash: e2fcccaed64f7689b42bf789c5adfb779a441503479d1b190cd4dd274ff91432
                        • Instruction Fuzzy Hash: 0B81B4795292419FCB24FF64C844A6AB7E4BF88314F28482EF886C72D1DA70DD58CB52
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 002AC266
                        • GetFocus.USER32 ref: 002AC276
                        • GetDlgCtrlID.USER32(00000000), ref: 002AC281
                        • _memset.LIBCMT ref: 002AC3AC
                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 002AC3D7
                        • GetMenuItemCount.USER32(?), ref: 002AC3F7
                        • GetMenuItemID.USER32(?,00000000), ref: 002AC40A
                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 002AC43E
                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 002AC486
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002AC4BE
                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 002AC4F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                        • String ID: 0
                        • API String ID: 1296962147-4108050209
                        • Opcode ID: 394387238a818daba37e3045c260b535b91a8e89fb26395163358b24f2ed4d60
                        • Instruction ID: 3dca03cce4e7222f742b61b208430807de434c6a7ed1ea273d5c2b0db04a9c81
                        • Opcode Fuzzy Hash: 394387238a818daba37e3045c260b535b91a8e89fb26395163358b24f2ed4d60
                        • Instruction Fuzzy Hash: E081A071528312AFDB10CF14D894A7ABBE8FF8E714F20452DF99597291CB70D825CBA2
                        APIs
                        • GetDC.USER32(00000000), ref: 002974A4
                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 002974B0
                        • CreateCompatibleDC.GDI32(?), ref: 002974BC
                        • SelectObject.GDI32(00000000,?), ref: 002974C9
                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0029751D
                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00297559
                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0029757D
                        • SelectObject.GDI32(00000006,?), ref: 00297585
                        • DeleteObject.GDI32(?), ref: 0029758E
                        • DeleteDC.GDI32(00000006), ref: 00297595
                        • ReleaseDC.USER32(00000000,?), ref: 002975A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: c1352a9a38917bb7a07187d75060998b1bdbbbe79f54a8a69d21450a85bcced7
                        • Instruction ID: 37af96bdf6939be7409341310352ec7d907a57125d9a5edf965368d68ffb04ac
                        • Opcode Fuzzy Hash: c1352a9a38917bb7a07187d75060998b1bdbbbe79f54a8a69d21450a85bcced7
                        • Instruction Fuzzy Hash: C0516B71914209EFCB24CFA8DC88EAEBBB9EF49710F14842DF98997211D735A850CF50
                        APIs
                          • Part of subcall function 00240AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00226C6C,?,00008000), ref: 00240AF3
                          • Part of subcall function 002248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002248A1,?,?,002237C0,?), ref: 002248CE
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00226D0D
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00226E5A
                          • Part of subcall function 002259CD: _wcscpy.LIBCMT ref: 00225A05
                          • Part of subcall function 002437BD: _iswctype.LIBCMT ref: 002437C5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                        • API String ID: 537147316-1018226102
                        • Opcode ID: 525dabcfa201326a4311f3a3bbfb20d7187e3d86aecb3af081af2f1e5ce2b082
                        • Instruction ID: b09284076370d0262e456f0ab69b7164b35210467a95ce005cc5f59270013672
                        • Opcode Fuzzy Hash: 525dabcfa201326a4311f3a3bbfb20d7187e3d86aecb3af081af2f1e5ce2b082
                        • Instruction Fuzzy Hash: 4302A131128351AFCB24EF60D881AAFBBE5BF99314F14491DF485972A1DB30DA69CF42
                        APIs
                        • _memset.LIBCMT ref: 002245F9
                        • GetMenuItemCount.USER32(002E5890), ref: 0025D6FD
                        • GetMenuItemCount.USER32(002E5890), ref: 0025D7AD
                        • GetCursorPos.USER32(?), ref: 0025D7F1
                        • SetForegroundWindow.USER32(00000000), ref: 0025D7FA
                        • TrackPopupMenuEx.USER32(002E5890,00000000,?,00000000,00000000,00000000), ref: 0025D80D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0025D819
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                        • String ID:
                        • API String ID: 2751501086-0
                        • Opcode ID: 89bc94b07fbe2133b54b01592fe6b57681cc8141127796c3aa32630fbb5ec1c1
                        • Instruction ID: 2c65cd29ae5c8177dfef76e009ddafed2bfe03fba6ac448976541ad7bcb1233b
                        • Opcode Fuzzy Hash: 89bc94b07fbe2133b54b01592fe6b57681cc8141127796c3aa32630fbb5ec1c1
                        • Instruction Fuzzy Hash: 1A71F530661216BFEB309F94EC49FAABF68FF05365F100216F919AA1E0CBB55874CB54
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 002989EC
                        • CoInitialize.OLE32(00000000), ref: 00298A19
                        • CoUninitialize.OLE32 ref: 00298A23
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00298B23
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00298C50
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,002B2C0C), ref: 00298C84
                        • CoGetObject.OLE32(?,00000000,002B2C0C,?), ref: 00298CA7
                        • SetErrorMode.KERNEL32(00000000), ref: 00298CBA
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00298D3A
                        • VariantClear.OLEAUT32(?), ref: 00298D4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                        • String ID: ,,+
                        • API String ID: 2395222682-1536947320
                        • Opcode ID: 21aeda50cce516e706ce6256246813173251e9945911521ed4282ce8ca8d7333
                        • Instruction ID: 940a2a1aeeff8d86de0f770d7e1ecffeadfe97d2ddcc02473ee1b6f1192a6e6c
                        • Opcode Fuzzy Hash: 21aeda50cce516e706ce6256246813173251e9945911521ed4282ce8ca8d7333
                        • Instruction Fuzzy Hash: 1DC123B1218305AFDB00DF64C88492BB7E9FF8A348F08491DF58A9B251DB71ED55CB62
                        APIs
                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029FE38,?,?), ref: 002A0EBC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 3964851224-909552448
                        • Opcode ID: 13f201b089c4224cc01609e878bf109adf99dda604adff9a89f83ead45a1c131
                        • Instruction ID: 1f14c4ad7f5869ecf064f4f689bccb068acbb463136c542579ceaee010816e07
                        • Opcode Fuzzy Hash: 13f201b089c4224cc01609e878bf109adf99dda604adff9a89f83ead45a1c131
                        • Instruction Fuzzy Hash: 4D416A3013429A9BCF24EF50E8E1AEE3724AF16310F544416FD516B292DF359DBACBA0
                        APIs
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                          • Part of subcall function 00227A84: _memmove.LIBCMT ref: 00227B0D
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 002853D7
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 002853ED
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 002853FE
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00285410
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00285421
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: SendString$_memmove
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2279737902-1007645807
                        • Opcode ID: 43f3a3c687759caa18e879df3670b846877f99f208fb6eb70f5119857c39954d
                        • Instruction ID: 15916a0f0f50aa7b7291b143b8c6f203409c1f590ca315b7f8864260665f8fc8
                        • Opcode Fuzzy Hash: 43f3a3c687759caa18e879df3670b846877f99f208fb6eb70f5119857c39954d
                        • Instruction Fuzzy Hash: 2F11CB25A7513979D720BBA1DC46DFFBB7CEB92B40F00041AB401A21D1DE604D65CAF0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 208665112-3771769585
                        • Opcode ID: 3017bdb607dd07e446c2abdde58e68597edcb313fe1c7008d57834b8c332a506
                        • Instruction ID: b24d0dcdf986e9f0d5522fde4281ef2ec10af3e35a3660fc44e9c52dbe210139
                        • Opcode Fuzzy Hash: 3017bdb607dd07e446c2abdde58e68597edcb313fe1c7008d57834b8c332a506
                        • Instruction Fuzzy Hash: B6112735924116AFDB24BB60ED4AEDAB7BCDF03710F410176F504960D1FFB88AA98B90
                        APIs
                        • timeGetTime.WINMM ref: 00285021
                          • Part of subcall function 0024034A: timeGetTime.WINMM(?,75C0B400,00230FDB), ref: 0024034E
                        • Sleep.KERNEL32(0000000A), ref: 0028504D
                        • EnumThreadWindows.USER32(?,Function_00064FCF,00000000), ref: 00285071
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00285093
                        • SetActiveWindow.USER32 ref: 002850B2
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 002850C0
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 002850DF
                        • Sleep.KERNEL32(000000FA), ref: 002850EA
                        • IsWindow.USER32 ref: 002850F6
                        • EndDialog.USER32(00000000), ref: 00285107
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: d799f0d530f014f32644bec7a7814a39a2b1b28f0a2b70fac94055f0342f5959
                        • Instruction ID: 450a9a8af58f5bc4ed772a6fddc2d5bc352b22e0579f9414395207c18a5162c7
                        • Opcode Fuzzy Hash: d799f0d530f014f32644bec7a7814a39a2b1b28f0a2b70fac94055f0342f5959
                        • Instruction Fuzzy Hash: CE21CF74252A55AFE7406FB0FDCCB363B6DEB1A785B440028F505852F1DF658C608B71
                        APIs
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • CoInitialize.OLE32(00000000), ref: 0028D676
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0028D709
                        • SHGetDesktopFolder.SHELL32(?), ref: 0028D71D
                        • CoCreateInstance.OLE32(002B2D7C,00000000,00000001,002D8C1C,?), ref: 0028D769
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0028D7D8
                        • CoTaskMemFree.OLE32(?,?), ref: 0028D830
                        • _memset.LIBCMT ref: 0028D86D
                        • SHBrowseForFolderW.SHELL32(?), ref: 0028D8A9
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0028D8CC
                        • CoTaskMemFree.OLE32(00000000), ref: 0028D8D3
                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0028D90A
                        • CoUninitialize.OLE32(00000001,00000000), ref: 0028D90C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                        • String ID:
                        • API String ID: 1246142700-0
                        • Opcode ID: 8df91a615d3b44679e11777d0f52934bd63055be895b581df1b75d13f09aaf71
                        • Instruction ID: 7d2cefbc014f224de24cf0cdde260e79a51022add69994066193b7ef64e0391e
                        • Opcode Fuzzy Hash: 8df91a615d3b44679e11777d0f52934bd63055be895b581df1b75d13f09aaf71
                        • Instruction Fuzzy Hash: E3B11B75A10119AFDB14EFA4D888DAEBBB9FF48304B148069F909EB291DB30ED55CF50
                        APIs
                        • GetKeyboardState.USER32(?), ref: 002803C8
                        • SetKeyboardState.USER32(?), ref: 00280433
                        • GetAsyncKeyState.USER32(000000A0), ref: 00280453
                        • GetKeyState.USER32(000000A0), ref: 0028046A
                        • GetAsyncKeyState.USER32(000000A1), ref: 00280499
                        • GetKeyState.USER32(000000A1), ref: 002804AA
                        • GetAsyncKeyState.USER32(00000011), ref: 002804D6
                        • GetKeyState.USER32(00000011), ref: 002804E4
                        • GetAsyncKeyState.USER32(00000012), ref: 0028050D
                        • GetKeyState.USER32(00000012), ref: 0028051B
                        • GetAsyncKeyState.USER32(0000005B), ref: 00280544
                        • GetKeyState.USER32(0000005B), ref: 00280552
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 7b2824453aeb716dc79e98da3c5e6cdd63eb9cdf02ab1fcfdbc675ddd03e0522
                        • Instruction ID: 20e3c8b836e067747a28c041e6fb5d4cfa270a83422a779b6468fc6b07aa06f3
                        • Opcode Fuzzy Hash: 7b2824453aeb716dc79e98da3c5e6cdd63eb9cdf02ab1fcfdbc675ddd03e0522
                        • Instruction Fuzzy Hash: 1B510B2892A7851AFB74FFB084907AEBFB49F01380F4885DD85C2561C3DA649B5CCB61
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 0027C545
                        • GetWindowRect.USER32(00000000,?), ref: 0027C557
                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0027C5B5
                        • GetDlgItem.USER32(?,00000002), ref: 0027C5C0
                        • GetWindowRect.USER32(00000000,?), ref: 0027C5D2
                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0027C626
                        • GetDlgItem.USER32(?,000003E9), ref: 0027C634
                        • GetWindowRect.USER32(00000000,?), ref: 0027C645
                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0027C688
                        • GetDlgItem.USER32(?,000003EA), ref: 0027C696
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0027C6B3
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0027C6C0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: a1c097ec312420a0c1c72a92b4413872ab701c359ee2962865696127f1c6879d
                        • Instruction ID: 9826f75bc5eb8b0c16ede8d5b38223530010fce6848744c8b1d7233a570fcc6c
                        • Opcode Fuzzy Hash: a1c097ec312420a0c1c72a92b4413872ab701c359ee2962865696127f1c6879d
                        • Instruction Fuzzy Hash: C1516571B10205AFDB18CFB9DD89A6EBBB9EB89710F14813DF519D7290DB749D008B50
                        APIs
                          • Part of subcall function 00221B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00222036,?,00000000,?,?,?,?,002216CB,00000000,?), ref: 00221B9A
                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 002220D3
                        • KillTimer.USER32(-00000001,?,?,?,?,002216CB,00000000,?,?,00221AE2,?,?), ref: 0022216E
                        • DestroyAcceleratorTable.USER32(00000000), ref: 0025BE26
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002216CB,00000000,?,?,00221AE2,?,?), ref: 0025BE57
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002216CB,00000000,?,?,00221AE2,?,?), ref: 0025BE6E
                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,002216CB,00000000,?,?,00221AE2,?,?), ref: 0025BE8A
                        • DeleteObject.GDI32(00000000), ref: 0025BE9C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: 53fdc964131b230090bc2eb2be0199471b6907ee4a6141ecef263db42d3c7e48
                        • Instruction ID: 2d9b9f18a351f7426d34b3e7ec70b7c191ed89e632ad5c726a47503035f04981
                        • Opcode Fuzzy Hash: 53fdc964131b230090bc2eb2be0199471b6907ee4a6141ecef263db42d3c7e48
                        • Instruction Fuzzy Hash: CD61BD30130A61FFCB26DF54EA89B25B7F1FB11306F544528EA424A960C776A9B8DF90
                        APIs
                          • Part of subcall function 002225DB: GetWindowLongW.USER32(?,000000EB), ref: 002225EC
                        • GetSysColor.USER32(0000000F), ref: 002221D3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: 36c6270a26a593120fb2e6decd34f41a1e76df15bc69a9c7b86ab54757390473
                        • Instruction ID: 756900af53076c3779cb2a79357a46a1721801b61b845d17d742c220cb73ab4d
                        • Opcode Fuzzy Hash: 36c6270a26a593120fb2e6decd34f41a1e76df15bc69a9c7b86ab54757390473
                        • Instruction Fuzzy Hash: B441AE31010161FFDB255FA8B888BB93B65EB06331F244365FD659A1E2CB738C66DB21
                        APIs
                        • CharLowerBuffW.USER32(?,?,002AF910), ref: 0028A995
                        • GetDriveTypeW.KERNEL32(00000061,002D89A0,00000061), ref: 0028AA5F
                        • _wcscpy.LIBCMT ref: 0028AA89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharDriveLowerType_wcscpy
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2820617543-1000479233
                        • Opcode ID: 29a8a35d330a1d043047cbbd14b343974f48fc40a09997dcb66c4af3039c580f
                        • Instruction ID: 41c24936c6e242e41f53a9ea64526f4e6cf1267ba8a5a0fb18331ccd65d738b5
                        • Opcode Fuzzy Hash: 29a8a35d330a1d043047cbbd14b343974f48fc40a09997dcb66c4af3039c580f
                        • Instruction Fuzzy Hash: D751CB34138301ABD318EF54D9D2AAAB7A5EF80704F10482AF596572E2DF709D69CB93
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __i64tow__itow__swprintf
                        • String ID: %.15g$0x%p$False$True
                        • API String ID: 421087845-2263619337
                        • Opcode ID: 6538d2da9890eccd1207a16309f216239c4a130d15e48db9caa1ce34a9ccabc4
                        • Instruction ID: cf44483690096f2c6ddfa9d9246f33c76636020a7b032fdc62a2572c05ad40e8
                        • Opcode Fuzzy Hash: 6538d2da9890eccd1207a16309f216239c4a130d15e48db9caa1ce34a9ccabc4
                        • Instruction Fuzzy Hash: 5441F33153421ABADB28DF74D942A7673E8EF04310F20447EE949D6291EA719DA5CB10
                        APIs
                        • _memset.LIBCMT ref: 002A719C
                        • CreateMenu.USER32 ref: 002A71B7
                        • SetMenu.USER32(?,00000000), ref: 002A71C6
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002A7253
                        • IsMenu.USER32(?), ref: 002A7269
                        • CreatePopupMenu.USER32 ref: 002A7273
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002A72A0
                        • DrawMenuBar.USER32 ref: 002A72A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                        • String ID: 0$F
                        • API String ID: 176399719-3044882817
                        • Opcode ID: 86b494d867ce8af188346d98a717dced6e9883331251d1fe05f3b36311e07766
                        • Instruction ID: 8bf52ca8f639a86c6f5b1d6639d76358059f697ddd13f75087f4856a1fe6c6c2
                        • Opcode Fuzzy Hash: 86b494d867ce8af188346d98a717dced6e9883331251d1fe05f3b36311e07766
                        • Instruction Fuzzy Hash: 11412975A11205EFDB20DFA4E988B9A77B5FB4A300F544129FD49A7350DB31A920CBA4
                        APIs
                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 002A7590
                        • CreateCompatibleDC.GDI32(00000000), ref: 002A7597
                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 002A75AA
                        • SelectObject.GDI32(00000000,00000000), ref: 002A75B2
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 002A75BD
                        • DeleteDC.GDI32(00000000), ref: 002A75C6
                        • GetWindowLongW.USER32(?,000000EC), ref: 002A75D0
                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 002A75E4
                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 002A75F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                        • String ID: static
                        • API String ID: 2559357485-2160076837
                        • Opcode ID: bd0cf002c17400f9aaa1cc40a6e761a5194e9e5c404fde7836f80ed3ab134ec1
                        • Instruction ID: 1de4ea9bbb82f5316595c0313373199a4a54a3e419128cfa9264504815e538e7
                        • Opcode Fuzzy Hash: bd0cf002c17400f9aaa1cc40a6e761a5194e9e5c404fde7836f80ed3ab134ec1
                        • Instruction Fuzzy Hash: F7317E32514115BBDF129FA4ED48FDB3B69FF0A720F110225FA25A61A0CB35D821DF64
                        APIs
                        • _memset.LIBCMT ref: 00246FBB
                          • Part of subcall function 00248CA8: __getptd_noexit.LIBCMT ref: 00248CA8
                        • __gmtime64_s.LIBCMT ref: 00247054
                        • __gmtime64_s.LIBCMT ref: 0024708A
                        • __gmtime64_s.LIBCMT ref: 002470A7
                        • __allrem.LIBCMT ref: 002470FD
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00247119
                        • __allrem.LIBCMT ref: 00247130
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0024714E
                        • __allrem.LIBCMT ref: 00247165
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00247183
                        • __invoke_watson.LIBCMT ref: 002471F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                        • String ID:
                        • API String ID: 384356119-0
                        • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                        • Instruction ID: 0f702629f35601cc9e591a1dfcee189a0fcd2a212f84aa272faf63545edb25d5
                        • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                        • Instruction Fuzzy Hash: F7713D71A20717ABE718DF78CC41B5AB3A8AF11364F10413AF819D7681E770DE648BD0
                        APIs
                        • _memset.LIBCMT ref: 0028283A
                        • GetMenuItemInfoW.USER32(002E5890,000000FF,00000000,00000030), ref: 0028289B
                        • SetMenuItemInfoW.USER32(002E5890,00000004,00000000,00000030), ref: 002828D1
                        • Sleep.KERNEL32(000001F4), ref: 002828E3
                        • GetMenuItemCount.USER32(?), ref: 00282927
                        • GetMenuItemID.USER32(?,00000000), ref: 00282943
                        • GetMenuItemID.USER32(?,-00000001), ref: 0028296D
                        • GetMenuItemID.USER32(?,?), ref: 002829B2
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 002829F8
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00282A0C
                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00282A2D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                        • String ID:
                        • API String ID: 4176008265-0
                        • Opcode ID: c1ec37322e4b110f0e83d40cfe0b23558e4ec8885f6de4a48c6f0e8124a166cc
                        • Instruction ID: f2386b2cb0fa8b8699cb46174a8377f21483fcee4c79c57adc39cb435007159a
                        • Opcode Fuzzy Hash: c1ec37322e4b110f0e83d40cfe0b23558e4ec8885f6de4a48c6f0e8124a166cc
                        • Instruction Fuzzy Hash: 3161C47892124AEFDF25EFA4DD889AE7BB8EF05304F140059E841A7291D735AD29DB20
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 002A6FD7
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 002A6FDA
                        • GetWindowLongW.USER32(?,000000F0), ref: 002A6FFE
                        • _memset.LIBCMT ref: 002A700F
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002A7021
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 002A7099
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow_memset
                        • String ID:
                        • API String ID: 830647256-0
                        • Opcode ID: 83bb6705b0372ec4b8652f2888b24460aeb276e442f986a73fa8e774e538e316
                        • Instruction ID: a51f2038e36f58e8f99d980dce696f26a438981f9a988aeeec928709dbee029d
                        • Opcode Fuzzy Hash: 83bb6705b0372ec4b8652f2888b24460aeb276e442f986a73fa8e774e538e316
                        • Instruction Fuzzy Hash: 02617B74910258EFDB10CFA4CC85EEE77F8EB09704F14015AFA15AB2A1CB70AD65CB54
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00276F15
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00276F6E
                        • VariantInit.OLEAUT32(?), ref: 00276F80
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00276FA0
                        • VariantCopy.OLEAUT32(?,?), ref: 00276FF3
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00277007
                        • VariantClear.OLEAUT32(?), ref: 0027701C
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00277029
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00277032
                        • VariantClear.OLEAUT32(?), ref: 00277044
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0027704F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: b35337ac2857918407bfbddfd921ad7be2145d39da4e5c7356f1a2350ade50e2
                        • Instruction ID: 7de9ee9dcbf6980f0faf232e9e0f82949a67b6f9dbcae6fe57ff60de6778e952
                        • Opcode Fuzzy Hash: b35337ac2857918407bfbddfd921ad7be2145d39da4e5c7356f1a2350ade50e2
                        • Instruction Fuzzy Hash: 61415435A14219AFCB10DFA4E848DAEBBB9FF48314F00C069FA59A7251CB74A955CF90
                        APIs
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • CoInitialize.OLE32 ref: 00298518
                        • CoUninitialize.OLE32 ref: 00298523
                        • CoCreateInstance.OLE32(?,00000000,00000017,002B2BEC,?), ref: 00298583
                        • IIDFromString.OLE32(?,?), ref: 002985F6
                        • VariantInit.OLEAUT32(?), ref: 00298690
                        • VariantClear.OLEAUT32(?), ref: 002986F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 834269672-1287834457
                        • Opcode ID: a662e7d444f276ad77bfe3dddfc15bec341033d23cdf9fd4b510addcc58e7005
                        • Instruction ID: b11aa1cec531c867bef3e87af37a7bb22d648b1f4a6e63a572146fd415fde4dc
                        • Opcode Fuzzy Hash: a662e7d444f276ad77bfe3dddfc15bec341033d23cdf9fd4b510addcc58e7005
                        • Instruction Fuzzy Hash: 8161E170228311AFDB10DF64D848F5AB7E8AF4A714F09481DF9859B291DB70ED68CB92
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 002958A9
                        • inet_addr.WSOCK32(?,?,?), ref: 002958EE
                        • gethostbyname.WSOCK32(?), ref: 002958FA
                        • IcmpCreateFile.IPHLPAPI ref: 00295908
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00295978
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0029598E
                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00295A03
                        • WSACleanup.WSOCK32 ref: 00295A09
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: dc5105bcd21768111baa105ca55f6cf3bb01117bf9d4467ec4a7ddfe6b608cf5
                        • Instruction ID: 034e16dcdd5ee626b8e64ab38afe4ae9779068935e46bf57f49370f523c432bc
                        • Opcode Fuzzy Hash: dc5105bcd21768111baa105ca55f6cf3bb01117bf9d4467ec4a7ddfe6b608cf5
                        • Instruction Fuzzy Hash: BA518031624721EFEB119F64DC49B2AB7E0EF45720F14852AF9999B2A0DB70EC50CF81
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0028B55C
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0028B5D2
                        • GetLastError.KERNEL32 ref: 0028B5DC
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 0028B649
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 8a466704a07d6f8faf2fc178ab9ce5b6432d072bd6e62b46a264f671f273ac9b
                        • Instruction ID: a05c2dfa708102511ab69925db2a9891ab8256a7104e416030d69242c6a9f90e
                        • Opcode Fuzzy Hash: 8a466704a07d6f8faf2fc178ab9ce5b6432d072bd6e62b46a264f671f273ac9b
                        • Instruction Fuzzy Hash: 1C31B439A25215AFCB11FFA4D885EAD77B8EF05304F14402AF505D72D1DB709D62CB90
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 002792D6
                        • GetDlgCtrlID.USER32 ref: 002792E1
                        • GetParent.USER32 ref: 002792FD
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00279300
                        • GetDlgCtrlID.USER32(?), ref: 00279309
                        • GetParent.USER32(?), ref: 00279325
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00279328
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 8f9dac3d00dea51fbb63b8cf1ead1a46d419d025615439c6499866183bfd7a3d
                        • Instruction ID: a1134c0caea5db54a8f4c405e3b8f913058f7d6b80a393bcd77678403ec0c9db
                        • Opcode Fuzzy Hash: 8f9dac3d00dea51fbb63b8cf1ead1a46d419d025615439c6499866183bfd7a3d
                        • Instruction Fuzzy Hash: EE21C470954204BBDF04ABA0DC89DFDBB68EF86310F104165B961972E1DB795865DF20
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 002793BF
                        • GetDlgCtrlID.USER32 ref: 002793CA
                        • GetParent.USER32 ref: 002793E6
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 002793E9
                        • GetDlgCtrlID.USER32(?), ref: 002793F2
                        • GetParent.USER32(?), ref: 0027940E
                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00279411
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 1536045017-1403004172
                        • Opcode ID: 706cb4be0c985f61a1802345bf449aaf0097fa971c7ae81de879ad18a5d01e64
                        • Instruction ID: e79676ba31ece36f573e607118b8d25d8e0ed0c977274dbd5664a4151e8f66bb
                        • Opcode Fuzzy Hash: 706cb4be0c985f61a1802345bf449aaf0097fa971c7ae81de879ad18a5d01e64
                        • Instruction Fuzzy Hash: CE21F570A10204BBDF00AFA4DC99EFEBBB8EF45300F104066F921A72A5DB795865DF20
                        APIs
                        • GetParent.USER32 ref: 00279431
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00279446
                        • _wcscmp.LIBCMT ref: 00279458
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 002794D3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend_wcscmp
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1704125052-3381328864
                        • Opcode ID: 966f2469772200a58ca2a67c568640a4a7435efd3b0fa32598be64928c5cd22b
                        • Instruction ID: 5445c1ff07eb32020c85b2875dd220aa5e85389b552e7619c272d40760753185
                        • Opcode Fuzzy Hash: 966f2469772200a58ca2a67c568640a4a7435efd3b0fa32598be64928c5cd22b
                        • Instruction Fuzzy Hash: D411243727C3077AF6145624AC17DD6735C9B06720F208117F908D50E1FF755CB24954
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00287B15
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ArraySafeVartype
                        • String ID:
                        • API String ID: 1725837607-0
                        • Opcode ID: a3c675b510610792d6f98059fb9f0b9818bd8a21e49bfc1be5dbdc49452f46f6
                        • Instruction ID: 49e348ea0223d03351cbf490d51b9a4b3e6d709af68c3b8ba7f3f4b28b805cc9
                        • Opcode Fuzzy Hash: a3c675b510610792d6f98059fb9f0b9818bd8a21e49bfc1be5dbdc49452f46f6
                        • Instruction Fuzzy Hash: D9B1AF7992921A9FDB10EF94D884BBEB7B4FF08325F244429E600E7291D774E951CFA0
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00281521
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00280599,?,00000001), ref: 00281535
                        • GetWindowThreadProcessId.USER32(00000000), ref: 0028153C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00280599,?,00000001), ref: 0028154B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0028155D
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00280599,?,00000001), ref: 00281576
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00280599,?,00000001), ref: 00281588
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00280599,?,00000001), ref: 002815CD
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00280599,?,00000001), ref: 002815E2
                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00280599,?,00000001), ref: 002815ED
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: e1720fb0580d79b803188563135378865e359d20893ac4f6a629051223254355
                        • Instruction ID: 6806cb442816d65884d4d1d19de87c510f17138ee12094e84d66d86297e0044c
                        • Opcode Fuzzy Hash: e1720fb0580d79b803188563135378865e359d20893ac4f6a629051223254355
                        • Instruction Fuzzy Hash: 99310379911245BFDF60AF90FDCCB6937ADEBA5351F504015F802CA1E0DBB89D618B60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$_memset
                        • String ID: ,,+$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2862541840-4011182307
                        • Opcode ID: 81924990bb145e8bb1f4719dd1b9e09b54a2369a7879facf69e6d37f73655dd2
                        • Instruction ID: b33d3314f3e30614f9e69d26c60e24dc431c2244cec43933f8b34e99f1e23607
                        • Opcode Fuzzy Hash: 81924990bb145e8bb1f4719dd1b9e09b54a2369a7879facf69e6d37f73655dd2
                        • Instruction Fuzzy Hash: EB91A070E20219ABDF25DFA9C844FAEBBB8EF45720F10855DF505AB280D7709995CFA0
                        APIs
                        • EnumChildWindows.USER32(?,0027A844), ref: 0027A782
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ChildEnumWindows
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 3555792229-1603158881
                        • Opcode ID: b940fd3f42dc30372ee02c35ee7cfe13f916bc6ba6327f73a6ef539e2e500776
                        • Instruction ID: dbe7ef31a5876d4a70b099fe54e83fb32922c6970a0daa64670b49280666288d
                        • Opcode Fuzzy Hash: b940fd3f42dc30372ee02c35ee7cfe13f916bc6ba6327f73a6ef539e2e500776
                        • Instruction Fuzzy Hash: 5A91A071A24506AADB08DFA0C4D1BEDFB78BF44324F54C11AE85DA7281DB3069B9CF91
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00222EAE
                          • Part of subcall function 00221DB3: GetClientRect.USER32(?,?), ref: 00221DDC
                          • Part of subcall function 00221DB3: GetWindowRect.USER32(?,?), ref: 00221E1D
                          • Part of subcall function 00221DB3: ScreenToClient.USER32(?,?), ref: 00221E45
                        • GetDC.USER32 ref: 0025CEB2
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0025CEC5
                        • SelectObject.GDI32(00000000,00000000), ref: 0025CED3
                        • SelectObject.GDI32(00000000,00000000), ref: 0025CEE8
                        • ReleaseDC.USER32(?,00000000), ref: 0025CEF0
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0025CF7B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: f77d09d2eab198f549adf1d066c72be1437af5ffa1898167a7bd4fc464c010ac
                        • Instruction ID: 6b6b5655e0093373d995d6a6bee50b610c47fc06222fd37415060b3f194a2430
                        • Opcode Fuzzy Hash: f77d09d2eab198f549adf1d066c72be1437af5ffa1898167a7bd4fc464c010ac
                        • Instruction Fuzzy Hash: F071F530420306EFCF219FA4D884AAA7BB6FF09311F244266FD555A166E7319C68DF60
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,002AF910), ref: 00298E3D
                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,002AF910), ref: 00298E71
                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00298FEB
                        • SysFreeString.OLEAUT32(?), ref: 00299015
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                        • String ID:
                        • API String ID: 560350794-0
                        • Opcode ID: f629ff3ad40d0c78f78f9db84e1d81e05b36e4af4dbe107e85c8b8beba92a0d2
                        • Instruction ID: f298725739b3994218127d14e666dd581cd25e785763155753cdb93db1621b83
                        • Opcode Fuzzy Hash: f629ff3ad40d0c78f78f9db84e1d81e05b36e4af4dbe107e85c8b8beba92a0d2
                        • Instruction Fuzzy Hash: 5FF13A71A1010AEFCF14DF98C888EAEB7B9FF49314F148059F519AB250DB71AE95CB50
                        APIs
                        • _memset.LIBCMT ref: 0029F7C9
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0029F95C
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0029F980
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0029F9C0
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0029F9E2
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0029FB5E
                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0029FB90
                        • CloseHandle.KERNEL32(?), ref: 0029FBBF
                        • CloseHandle.KERNEL32(?), ref: 0029FC36
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                        • String ID:
                        • API String ID: 4090791747-0
                        • Opcode ID: 980e73c6d96fbdfe7b91bdd93704b59854caf3198abfaa438523ecc209e7c436
                        • Instruction ID: c8a5d9f8f4363325e24b616b9965b10f2c2b103bc85f4eb1fe401b4d53287d69
                        • Opcode Fuzzy Hash: 980e73c6d96fbdfe7b91bdd93704b59854caf3198abfaa438523ecc209e7c436
                        • Instruction Fuzzy Hash: C5E1B131624301DFCB94EF24D595B6ABBE0AF89314F14846DF8898B2A2DB31DC64CF52
                        APIs
                          • Part of subcall function 002846AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002836DB,?), ref: 002846CC
                          • Part of subcall function 002846AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002836DB,?), ref: 002846E5
                          • Part of subcall function 00284AD8: GetFileAttributesW.KERNEL32(?,0028374F), ref: 00284AD9
                        • lstrcmpiW.KERNEL32(?,?), ref: 00284DE7
                        • _wcscmp.LIBCMT ref: 00284E01
                        • MoveFileW.KERNEL32(?,?), ref: 00284E1C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                        • String ID:
                        • API String ID: 793581249-0
                        • Opcode ID: 263fb70d5a1ccccdc248703cd9853b5dc623f0ac7ae8e231b9bd901a3b54f7a6
                        • Instruction ID: 520c0a7c1767e4a9749ca02d3d3e67db735c8acc92f0b44d87831e69ae3e3b83
                        • Opcode Fuzzy Hash: 263fb70d5a1ccccdc248703cd9853b5dc623f0ac7ae8e231b9bd901a3b54f7a6
                        • Instruction Fuzzy Hash: C35184B64183969BC724FB90D8819DFB3ECAF85300F40092EB685D3191EF74A69C8B56
                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 002A8731
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: e8b89b6810b2a07de4051e45fdb6c4645a9bb5a657f4cb6c2fdfdc64b917dd6e
                        • Instruction ID: af0f4de9d67a40ddac0553b8e00acd849e2c9e67574d388923bbf8188ee37da9
                        • Opcode Fuzzy Hash: e8b89b6810b2a07de4051e45fdb6c4645a9bb5a657f4cb6c2fdfdc64b917dd6e
                        • Instruction Fuzzy Hash: 5251C570520219FFEB249F65DC89B997B68EB07710F604126FA15D61E0CF75A9B0CB50
                        APIs
                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0025C477
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0025C499
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0025C4B1
                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0025C4CF
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0025C4F0
                        • DestroyIcon.USER32(00000000), ref: 0025C4FF
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0025C51C
                        • DestroyIcon.USER32(?), ref: 0025C52B
                          • Part of subcall function 002AA4E1: DeleteObject.GDI32(00000000), ref: 002AA51A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                        • String ID:
                        • API String ID: 2819616528-0
                        • Opcode ID: f5d46cacfe827d468c14ff0b9f90a238ecd98383e383e234d86fe527dece4519
                        • Instruction ID: 9d524966c91ce8b2e04414290c3bd5fed41aebd524038a1efb8793cead1e3f6e
                        • Opcode Fuzzy Hash: f5d46cacfe827d468c14ff0b9f90a238ecd98383e383e234d86fe527dece4519
                        • Instruction Fuzzy Hash: D2519D74620215FFDB20DFA4EC45FAA77B5EB18715F100128F902A7290EBB5EDA4DB50
                        APIs
                          • Part of subcall function 0027AC37: GetWindowThreadProcessId.USER32(?,00000000), ref: 0027AC57
                          • Part of subcall function 0027AC37: GetCurrentThreadId.KERNEL32 ref: 0027AC5E
                          • Part of subcall function 0027AC37: AttachThreadInput.USER32(00000000,?,00279945,?,00000001), ref: 0027AC65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00279950
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 0027996D
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00279970
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00279979
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00279997
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0027999A
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 002799A3
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 002799BA
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 002799BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: 4c76821c5a937bb02573b9c7e3d514d44c3e805a23b4011d8cd2c9ba65d15a6c
                        • Instruction ID: b36aa392d1bb9a293bc372cae48df7efa0067bf5f5bc4e8cede426d5cc756296
                        • Opcode Fuzzy Hash: 4c76821c5a937bb02573b9c7e3d514d44c3e805a23b4011d8cd2c9ba65d15a6c
                        • Instruction Fuzzy Hash: 7C11CE71560218FFF6106BA0EC8EF6A7A2DEB4D761F100429F658AB0A0CDF65C519EA4
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00278864,00000B00,?,?), ref: 00278BEC
                        • HeapAlloc.KERNEL32(00000000,?,00278864,00000B00,?,?), ref: 00278BF3
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00278864,00000B00,?,?), ref: 00278C08
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00278864,00000B00,?,?), ref: 00278C10
                        • DuplicateHandle.KERNEL32(00000000,?,00278864,00000B00,?,?), ref: 00278C13
                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00278864,00000B00,?,?), ref: 00278C23
                        • GetCurrentProcess.KERNEL32(00278864,00000000,?,00278864,00000B00,?,?), ref: 00278C2B
                        • DuplicateHandle.KERNEL32(00000000,?,00278864,00000B00,?,?), ref: 00278C2E
                        • CreateThread.KERNEL32(00000000,00000000,00278C54,00000000,00000000,00000000), ref: 00278C48
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: bf79f140c7e040d80fc5878faaebe9facdde7593d01ba3257dfd8b599009fdbe
                        • Instruction ID: 169882b0f6f856e8130f4ed84a354b740e1babffd261d7d4b702e6323f2841b7
                        • Opcode Fuzzy Hash: bf79f140c7e040d80fc5878faaebe9facdde7593d01ba3257dfd8b599009fdbe
                        • Instruction Fuzzy Hash: 1101BFB5240344FFE750ABA5ED4DF573BACEB89711F104421FA09DB191DA749800CB20
                        APIs
                          • Part of subcall function 00277432: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?,?,0027777D), ref: 0027744F
                          • Part of subcall function 00277432: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?), ref: 0027746A
                          • Part of subcall function 00277432: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?), ref: 00277478
                          • Part of subcall function 00277432: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?), ref: 00277488
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0029991B
                        • _memset.LIBCMT ref: 00299928
                        • _memset.LIBCMT ref: 00299A6B
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00299A97
                        • CoTaskMemFree.OLE32(?), ref: 00299AA2
                        Strings
                        • NULL Pointer assignment, xrefs: 00299AF0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 1300414916-2785691316
                        • Opcode ID: 69948f087fd3c7583eb9552b31c640671724655e7d4bb4f686e5de82b4b1c722
                        • Instruction ID: d9765954eb5b7c827418f4d24b73e2b82645df545f3c6b70c8a068d8750e3689
                        • Opcode Fuzzy Hash: 69948f087fd3c7583eb9552b31c640671724655e7d4bb4f686e5de82b4b1c722
                        • Instruction Fuzzy Hash: 0C912771D10229EBDF10DFA5DC85ADEBBB8EF08710F20815AF419A7281DB719A54CFA0
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 002A6E56
                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 002A6E6A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 002A6E84
                        • _wcscat.LIBCMT ref: 002A6EDF
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 002A6EF6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 002A6F24
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcscat
                        • String ID: SysListView32
                        • API String ID: 307300125-78025650
                        • Opcode ID: a0892e134141de49d7a156459193842cc6e1e3ca92d10e88053c2f14f0415506
                        • Instruction ID: a241b4499325e72d57959c44b2b3a452a3d3ce75fee6ef9c99a82e7aea84629a
                        • Opcode Fuzzy Hash: a0892e134141de49d7a156459193842cc6e1e3ca92d10e88053c2f14f0415506
                        • Instruction Fuzzy Hash: F641B030A10309AFEB219FA4CC89FEAB7A8EF09750F14042AF545E7191DB729DA4CB50
                        APIs
                          • Part of subcall function 00283C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00283CBE
                          • Part of subcall function 00283C99: Process32FirstW.KERNEL32(00000000,?), ref: 00283CCC
                          • Part of subcall function 00283C99: CloseHandle.KERNEL32(00000000), ref: 00283D96
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0029EAB8
                        • GetLastError.KERNEL32 ref: 0029EACB
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0029EAFA
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0029EB77
                        • GetLastError.KERNEL32(00000000), ref: 0029EB82
                        • CloseHandle.KERNEL32(00000000), ref: 0029EBB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: b3d75f9ae5ed3ea251554f6e0900b4230e44f267ca797e4d78452f9345ec036c
                        • Instruction ID: ce901907678af9e2380c20458db6a9f6dccc2a694b4b717742fa4062894bfc0c
                        • Opcode Fuzzy Hash: b3d75f9ae5ed3ea251554f6e0900b4230e44f267ca797e4d78452f9345ec036c
                        • Instruction Fuzzy Hash: 2741CD706202019FDF14EF54DCAAF6DB7A1BF44314F198458F8468B2D2CBB5A864CF86
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 002830CD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: f6e63c2e70c454a450a646b1dc1247a4c7cfe2310d0bfe050c331fbcc517467e
                        • Instruction ID: 158acda2c9d2c017f81447fd997137284dd8d80cfe19b3b89f8facc584ecaac1
                        • Opcode Fuzzy Hash: f6e63c2e70c454a450a646b1dc1247a4c7cfe2310d0bfe050c331fbcc517467e
                        • Instruction Fuzzy Hash: FF11EB39629747BAE724FE55EC42C6A779C9F06B20F10002BF500962C2EFB55F6147A1
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00284353
                        • LoadStringW.USER32(00000000), ref: 0028435A
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00284370
                        • LoadStringW.USER32(00000000), ref: 00284377
                        • _wprintf.LIBCMT ref: 0028439D
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 002843BB
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00284398
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wprintf
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 3648134473-3128320259
                        • Opcode ID: 207e61eae57e85aa21addc254efad594ab3a53e6d364300df2e3f530d9dfa671
                        • Instruction ID: e3e00a42c38e670525614408e57376a73b22fef58e13c1645450561739db5d01
                        • Opcode Fuzzy Hash: 207e61eae57e85aa21addc254efad594ab3a53e6d364300df2e3f530d9dfa671
                        • Instruction Fuzzy Hash: 1E0184F6900208BFE751ABD4AE8DEE6736CD709700F0005A1BB09D2051DA749E944B70
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • GetSystemMetrics.USER32(0000000F), ref: 002AD4E6
                        • GetSystemMetrics.USER32(0000000F), ref: 002AD506
                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 002AD741
                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 002AD75F
                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 002AD780
                        • ShowWindow.USER32(00000003,00000000), ref: 002AD79F
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 002AD7C4
                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 002AD7E7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                        • String ID:
                        • API String ID: 1211466189-0
                        • Opcode ID: baf388782c1361620e8d2325f5be44beb7b4a26a283eeb2c18a2ef6cb3eb2508
                        • Instruction ID: c6bca3e7baa32ef6b258f002a5503450e500d69ca06256742cdcb350da2dd3bd
                        • Opcode Fuzzy Hash: baf388782c1361620e8d2325f5be44beb7b4a26a283eeb2c18a2ef6cb3eb2508
                        • Instruction Fuzzy Hash: 8BB1AD75510226EFDF18CF68C9C97AD7BB1FF06700F088069EC5A9EA95DB34A960CB50
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0025C347,00000004,00000000,00000000,00000000), ref: 00222ACF
                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0025C347,00000004,00000000,00000000,00000000,000000FF), ref: 00222B17
                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0025C347,00000004,00000000,00000000,00000000), ref: 0025C39A
                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0025C347,00000004,00000000,00000000,00000000), ref: 0025C406
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: 562dfe6f8406e62852fe0da3c86797f599e51255b3d1d9f8daf3fa9e06a54179
                        • Instruction ID: e6a6599ce7cff75f3b16950b171065ee871f3aed8ace3a663417c1b7905c7fcd
                        • Opcode Fuzzy Hash: 562dfe6f8406e62852fe0da3c86797f599e51255b3d1d9f8daf3fa9e06a54179
                        • Instruction Fuzzy Hash: 21412930234791FFC7758FA8BD8C76A7B95BB45304F24C829E48786960DAB698ADC710
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00287186
                          • Part of subcall function 00240F36: std::exception::exception.LIBCMT ref: 00240F6C
                          • Part of subcall function 00240F36: __CxxThrowException@8.LIBCMT ref: 00240F81
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 002871BD
                        • EnterCriticalSection.KERNEL32(?), ref: 002871D9
                        • _memmove.LIBCMT ref: 00287227
                        • _memmove.LIBCMT ref: 00287244
                        • LeaveCriticalSection.KERNEL32(?), ref: 00287253
                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00287268
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00287287
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                        • String ID:
                        • API String ID: 256516436-0
                        • Opcode ID: f503d9bcdeaba246a2d3d75652730ae57cf76c2fa5cc99b58d9113ecfbbf1682
                        • Instruction ID: 5669a0b25739d5361d2108ad3ec2f7c1a7f8e8cc55a4a3bff0e0d6127094f70a
                        • Opcode Fuzzy Hash: f503d9bcdeaba246a2d3d75652730ae57cf76c2fa5cc99b58d9113ecfbbf1682
                        • Instruction Fuzzy Hash: A231BE31910205EBCB20EFA4DD89AAA7778FF45310B2541B5FD04AB256DB70DE64CBA0
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 002A621D
                        • GetDC.USER32(00000000), ref: 002A6225
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A6230
                        • ReleaseDC.USER32(00000000,00000000), ref: 002A623C
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 002A6278
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 002A6289
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,002A905C,?,?,000000FF,00000000,?,000000FF,?), ref: 002A62C3
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002A62E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: 6c5f1be93e832ea375fe36cb5cf2393763870581e8470d8a073f44c45a25d95c
                        • Instruction ID: 23c2f4232dbbbbea80a69831dc78d8d3fe28ad5be603aca83c96b16e2ebb6cbe
                        • Opcode Fuzzy Hash: 6c5f1be93e832ea375fe36cb5cf2393763870581e8470d8a073f44c45a25d95c
                        • Instruction Fuzzy Hash: C3316D72251210BFEB118F60DD4AFEA3FADEF4A751F080065FE089A191CB799851CBA4
                        APIs
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                          • Part of subcall function 0023FE06: _wcscpy.LIBCMT ref: 0023FE29
                        • _wcstok.LIBCMT ref: 0028ED20
                        • _wcscpy.LIBCMT ref: 0028EDAF
                        • _memset.LIBCMT ref: 0028EDE2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                        • String ID: X
                        • API String ID: 774024439-3081909835
                        • Opcode ID: d734d5142d20dafa6d2459cf253b6297bf1f28467094a1094083f30d3f7d3920
                        • Instruction ID: f0d5600a7a08267ebfa9cda18f92e96477f30b612ea2d3fe84b36eee5e4a204a
                        • Opcode Fuzzy Hash: d734d5142d20dafa6d2459cf253b6297bf1f28467094a1094083f30d3f7d3920
                        • Instruction Fuzzy Hash: B8C1A135528311AFDB24EF64D881A5EB7E4BF85310F01492DF899972A2DB30EC65CF82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bac68fdc3dd23864d485e02bdd804f0983a34f7b66c84f3286a3a8212cbeeb3d
                        • Instruction ID: 02e7cc4634a5fbf726a943588fec1258b21c9b6a0d44688e556641d2bb708b2d
                        • Opcode Fuzzy Hash: bac68fdc3dd23864d485e02bdd804f0983a34f7b66c84f3286a3a8212cbeeb3d
                        • Instruction Fuzzy Hash: 63716930910119FFCB05DF98D849EAEBB79FF95310F108159F915AA291C734AA61CFA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a67f78274f3b63c726e682cb7efd45b58cddb523a93785b10bdd6c181abfd104
                        • Instruction ID: 92468ca3cbaef6f8bcfe279a5061e4d01127c8362543d70a166420c5698cb3a8
                        • Opcode Fuzzy Hash: a67f78274f3b63c726e682cb7efd45b58cddb523a93785b10bdd6c181abfd104
                        • Instruction Fuzzy Hash: D261CC31528311ABDB20EFA4DC8AF6FB3E8AF84714F004919F59597292DA70DD64CB92
                        APIs
                        • IsWindow.USER32(011D52B8), ref: 002AB41F
                        • IsWindowEnabled.USER32(011D52B8), ref: 002AB42B
                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 002AB50F
                        • SendMessageW.USER32(011D52B8,000000B0,?,?), ref: 002AB546
                        • IsDlgButtonChecked.USER32(?,?), ref: 002AB583
                        • GetWindowLongW.USER32(011D52B8,000000EC), ref: 002AB5A5
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 002AB5BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: 6e122269e09131f59aa922b68afc8eabce35ac28a05d90b27551f48c8b88aeb3
                        • Instruction ID: 04cb543475e0053cde1e1c654213ffdba347343fbf6161dda685d8ff35de99e1
                        • Opcode Fuzzy Hash: 6e122269e09131f59aa922b68afc8eabce35ac28a05d90b27551f48c8b88aeb3
                        • Instruction Fuzzy Hash: 38719134660605EFDB229F65D8A8FAABBA9FF0E300F544059E95597263CB31AC60CF50
                        APIs
                        • _memset.LIBCMT ref: 0029F55C
                        • _memset.LIBCMT ref: 0029F625
                        • ShellExecuteExW.SHELL32(?), ref: 0029F66A
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                          • Part of subcall function 0023FE06: _wcscpy.LIBCMT ref: 0023FE29
                        • GetProcessId.KERNEL32(00000000), ref: 0029F6E1
                        • CloseHandle.KERNEL32(00000000), ref: 0029F710
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                        • String ID: @
                        • API String ID: 3522835683-2766056989
                        • Opcode ID: f2a4cc4fa0e413f4dc6507ce597c83c0e88a9fa6de8d4ec8a276166382e501e0
                        • Instruction ID: 3006a998ce209c85c80d9a83f3fa28a5caab975662fb3e121d587aace550eba6
                        • Opcode Fuzzy Hash: f2a4cc4fa0e413f4dc6507ce597c83c0e88a9fa6de8d4ec8a276166382e501e0
                        • Instruction Fuzzy Hash: E361AF75A106299FCF54DF94D5819ADBBF4FF48310F148469E856AB361CB30ADA0CF90
                        APIs
                        • GetParent.USER32(?), ref: 002812BD
                        • GetKeyboardState.USER32(?), ref: 002812D2
                        • SetKeyboardState.USER32(?), ref: 00281333
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00281361
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00281380
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 002813C6
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 002813E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 661df2079bbbb681ab7085665afe60721c24e5d0d65f5e84b2a31749bb5183dd
                        • Instruction ID: a3298d5a86ad99633d39247b2ebdb2b3455a3b473d909bcae38410780529b23d
                        • Opcode Fuzzy Hash: 661df2079bbbb681ab7085665afe60721c24e5d0d65f5e84b2a31749bb5183dd
                        • Instruction Fuzzy Hash: 1E51E5A4A257D23EFB366A348C45BBA7EAD5F06304F0885C9E0D5858C3C6D8ACF6D750
                        APIs
                        • GetParent.USER32(00000000), ref: 002810D6
                        • GetKeyboardState.USER32(?), ref: 002810EB
                        • SetKeyboardState.USER32(?), ref: 0028114C
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00281178
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00281195
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 002811D9
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 002811FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 330ff6311d99f3d8d59cdf406526843bd429dfc1aa0c4e93488952d409d30dc3
                        • Instruction ID: 8c9426a1e132e84fb09b8adcdc2e2b05cd13b6aaf963141f0a955b0106e4f1c9
                        • Opcode Fuzzy Hash: 330ff6311d99f3d8d59cdf406526843bd429dfc1aa0c4e93488952d409d30dc3
                        • Instruction Fuzzy Hash: 665169A45267D33DFB32AB208C49F767FAD5B02300F088589E5D9468C2C294ECBAE750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _wcsncpy$LocalTime
                        • String ID:
                        • API String ID: 2945705084-0
                        • Opcode ID: ebcb1c22f4f04af97c2dd2de4a732a82603b25ed53bcb71a0cb1cf3064a55c81
                        • Instruction ID: a641a9b74ac8369d3d14fa1aace57e1e80ba79dacb82cb429db254465ea1c7d1
                        • Opcode Fuzzy Hash: ebcb1c22f4f04af97c2dd2de4a732a82603b25ed53bcb71a0cb1cf3064a55c81
                        • Instruction Fuzzy Hash: B241C2A9C31A24B5CB15FBB49C46ACFB7BCAF05310F508466F908E3161E634A764CBE5
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0027D8E3
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0027D919
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0027D92A
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0027D9AC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: ,,+$DllGetClassObject
                        • API String ID: 753597075-2070356415
                        • Opcode ID: 3b18a4bfcac211cec4849657e2478fa98e8fd86ccba6bc0ec911aeddcf1548fd
                        • Instruction ID: 3965aafd1d0d23e71e6bb2a638bbd43d1ef19ebb5020ef10a0161e0e44305db6
                        • Opcode Fuzzy Hash: 3b18a4bfcac211cec4849657e2478fa98e8fd86ccba6bc0ec911aeddcf1548fd
                        • Instruction Fuzzy Hash: 6C41BF71620205EFDB04DF55C8C4A9ABBB9EF86314F11C0A9EE099F206DBB4DD50CBA0
                        APIs
                          • Part of subcall function 002846AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,002836DB,?), ref: 002846CC
                          • Part of subcall function 002846AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,002836DB,?), ref: 002846E5
                        • lstrcmpiW.KERNEL32(?,?), ref: 002836FB
                        • _wcscmp.LIBCMT ref: 00283717
                        • MoveFileW.KERNEL32(?,?), ref: 0028372F
                        • _wcscat.LIBCMT ref: 00283777
                        • SHFileOperationW.SHELL32(?), ref: 002837E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                        • String ID: \*.*
                        • API String ID: 1377345388-1173974218
                        • Opcode ID: c08074cf8c0cfb5d53f43d79f89cca8601f26d0b0679467ad87a08e505be47eb
                        • Instruction ID: 4377c5117366522681d1d977fe7949f7c450721b9fe05fe70a1ee531d9118e01
                        • Opcode Fuzzy Hash: c08074cf8c0cfb5d53f43d79f89cca8601f26d0b0679467ad87a08e505be47eb
                        • Instruction Fuzzy Hash: 3F41EDB6019385AAC755FF60D441ADBB7ECEF88740F40082EB08AC3191EA34D3A8CB52
                        APIs
                        • _memset.LIBCMT ref: 002A72DC
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002A7383
                        • IsMenu.USER32(?), ref: 002A739B
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002A73E3
                        • DrawMenuBar.USER32 ref: 002A73F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert_memset
                        • String ID: 0
                        • API String ID: 3866635326-4108050209
                        • Opcode ID: 2c0cc075e120e491298b3b59321a7a6baaf998fa1a870cceba8284a2867b13dc
                        • Instruction ID: d26a9b9ac67d124c93e470113bd5fe8a36d119d336f8ede4ab70c5c547a94896
                        • Opcode Fuzzy Hash: 2c0cc075e120e491298b3b59321a7a6baaf998fa1a870cceba8284a2867b13dc
                        • Instruction Fuzzy Hash: 44414C75A14209EFDB20DF50E884E9ABBF8FB0A314F048069ED1697260DB34AD65DF94
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 002A105C
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002A1086
                        • FreeLibrary.KERNEL32(00000000), ref: 002A113D
                          • Part of subcall function 002A102D: RegCloseKey.ADVAPI32(?), ref: 002A10A3
                          • Part of subcall function 002A102D: FreeLibrary.KERNEL32(?), ref: 002A10F5
                          • Part of subcall function 002A102D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 002A1118
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 002A10E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                        • String ID:
                        • API String ID: 395352322-0
                        • Opcode ID: 7fda941d09bdf1a01eeae370937b0e9ce0ac58a6cdef8f8a4d8e8804d7139f4b
                        • Instruction ID: 04707b44e2993b335523393e99e5d39ec934fb1b97b63b4cb4870b2b3e8fc746
                        • Opcode Fuzzy Hash: 7fda941d09bdf1a01eeae370937b0e9ce0ac58a6cdef8f8a4d8e8804d7139f4b
                        • Instruction Fuzzy Hash: C0314DB1921109BFDB148FD0ED89EFFB7BCEF0A350F000169E905A2141DE749E999AA0
                        APIs
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 002A631E
                        • GetWindowLongW.USER32(011D52B8,000000F0), ref: 002A6351
                        • GetWindowLongW.USER32(011D52B8,000000F0), ref: 002A6386
                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 002A63B8
                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 002A63E2
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 002A63F3
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 002A640D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: 8b3e7fdc47757bab45ccd7dbbb41350899323d876dabcf2b98295d66875e893c
                        • Instruction ID: d553406b69adbb4a775347c379729ab66d38e3a65d36f298144ecd87a3ed844a
                        • Opcode Fuzzy Hash: 8b3e7fdc47757bab45ccd7dbbb41350899323d876dabcf2b98295d66875e893c
                        • Instruction Fuzzy Hash: C0311135664251AFDB20CF58EC88F5537E5FB4AB14F1801A4FA148F2B2CB62AC91DB51
                        APIs
                          • Part of subcall function 00297EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00297ECB
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 002962DC
                        • WSAGetLastError.WSOCK32(00000000), ref: 002962EB
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00296324
                        • connect.WSOCK32(00000000,?,00000010), ref: 0029632D
                        • WSAGetLastError.WSOCK32 ref: 00296337
                        • closesocket.WSOCK32(00000000), ref: 00296360
                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00296379
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                        • String ID:
                        • API String ID: 910771015-0
                        • Opcode ID: 5d5db747e83e0c3768a2cd97c40f2573b9d889432b04e2271f7fd4c69ef2458a
                        • Instruction ID: c07400d016bee42c54a1ef864f535d84d3db277d983759e0085257ea9ec65bd2
                        • Opcode Fuzzy Hash: 5d5db747e83e0c3768a2cd97c40f2573b9d889432b04e2271f7fd4c69ef2458a
                        • Instruction Fuzzy Hash: 4E31F631620218AFDF109FA0DD89BBE77E9EF45720F004069FD0597290DB78AC548FA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __wcsnicmp
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 1038674560-2734436370
                        • Opcode ID: cde57221c1195d675a4bde0394fa2778cfcdd5a24b3c3c5137f40f38a76d5958
                        • Instruction ID: 9ae4ceb7d55874e178c1dfa6b1285794a27b6df68ca44b4c202a333940de717e
                        • Opcode Fuzzy Hash: cde57221c1195d675a4bde0394fa2778cfcdd5a24b3c3c5137f40f38a76d5958
                        • Instruction Fuzzy Hash: 9121373213C612B6D364EE259D02FB773989F62320F508035F98E86191EBB09DB6C695
                        APIs
                          • Part of subcall function 00221D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00221D73
                          • Part of subcall function 00221D35: GetStockObject.GDI32(00000011), ref: 00221D87
                          • Part of subcall function 00221D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00221D91
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 002A7664
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 002A7671
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 002A767C
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 002A768B
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 002A7697
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: a4dd6a7f6dc5b7b5cc3e37435d45ad2681280a3174a0987247918d14980df465
                        • Instruction ID: ee0d74b6c513813759c6289864bedcb09adb5398f0ec5b694835025af624e722
                        • Opcode Fuzzy Hash: a4dd6a7f6dc5b7b5cc3e37435d45ad2681280a3174a0987247918d14980df465
                        • Instruction Fuzzy Hash: 3A11E2B212021ABFEF118FA4DC85EE77F6DEF09758F014115BA04A6090CA72AC31DBA4
                        APIs
                        • _memset.LIBCMT ref: 002AB678
                        • _memset.LIBCMT ref: 002AB687
                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002E6F20,002E6F64), ref: 002AB6B6
                        • CloseHandle.KERNEL32 ref: 002AB6C8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memset$CloseCreateHandleProcess
                        • String ID: o.$do.
                        • API String ID: 3277943733-2344610618
                        • Opcode ID: 082066e7a76a4053cf3ed0fdb0cfaed3858de6a7cb1950075439a6ec4d60daff
                        • Instruction ID: c2b081d4c942feabdb43117b15cd8d9502fa40eed870498a382763c31d3fcc63
                        • Opcode Fuzzy Hash: 082066e7a76a4053cf3ed0fdb0cfaed3858de6a7cb1950075439a6ec4d60daff
                        • Instruction Fuzzy Hash: 9CF089B1590344BFE71027617C4DF7B3A5CEB15794F404020BA09D9992DB755C148BE8
                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,002441D2,?), ref: 00244123
                        • GetProcAddress.KERNEL32(00000000), ref: 0024412A
                        • EncodePointer.KERNEL32(00000000), ref: 00244136
                        • DecodePointer.KERNEL32(00000001,002441D2,?), ref: 00244153
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoInitialize$combase.dll
                        • API String ID: 3489934621-340411864
                        • Opcode ID: 9e3d7af4df8c8b582e32e2a6f243a363ce7d7ac1973123c7b3b1e63cb5cb65d0
                        • Instruction ID: 0264767dee69effa140ba5769eb3fb5388c11391f7f21fad69e43f0e0a029098
                        • Opcode Fuzzy Hash: 9e3d7af4df8c8b582e32e2a6f243a363ce7d7ac1973123c7b3b1e63cb5cb65d0
                        • Instruction Fuzzy Hash: B3E0ED706A0381AFEF50AFB0FD4DB543594A757747F904468B409DE0A0DAB941549A00
                        APIs
                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,002440F8), ref: 002441F8
                        • GetProcAddress.KERNEL32(00000000), ref: 002441FF
                        • EncodePointer.KERNEL32(00000000), ref: 0024420A
                        • DecodePointer.KERNEL32(002440F8), ref: 00244225
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                        • String ID: RoUninitialize$combase.dll
                        • API String ID: 3489934621-2819208100
                        • Opcode ID: 1413b1333f7ce81de503d3b0db8795ed3e9335fb34dc7ea80420fc155944c468
                        • Instruction ID: 5c8bdf7ef23c4bbc30c76cc5b3f317483efb82c9a5055f25b0baa4fc143fae37
                        • Opcode Fuzzy Hash: 1413b1333f7ce81de503d3b0db8795ed3e9335fb34dc7ea80420fc155944c468
                        • Instruction Fuzzy Hash: B4E092706A1341EBEB90EFA2FE4DB453AA4B706783F1044A8F515EA0A0CFFA46149A10
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove$__itow__swprintf
                        • String ID:
                        • API String ID: 3253778849-0
                        • Opcode ID: 55016113ab1fbb1911c622d322bd21517cfa51792b1fffc6c684ec480bef6ffe
                        • Instruction ID: 9ae6af1713f0e655eb5e69140740d684e6b70d8dc0414a0d27ee607f1c8e6ce4
                        • Opcode Fuzzy Hash: 55016113ab1fbb1911c622d322bd21517cfa51792b1fffc6c684ec480bef6ffe
                        • Instruction Fuzzy Hash: E661DC3452126AAFDF15FF60C886EFE77A8AF04308F044428F9551B1D2EB34A8A5CF90
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 002A0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029FE38,?,?), ref: 002A0EBC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002A0348
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002A0388
                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 002A03AB
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 002A03D4
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 002A0417
                        • RegCloseKey.ADVAPI32(00000000), ref: 002A0424
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                        • String ID:
                        • API String ID: 4046560759-0
                        • Opcode ID: 59a20833c65ddb9c069bd4fc6c699aa1ef8adc516a47ff8223db9a6a44e0b837
                        • Instruction ID: 70e1184f6bec42944c1f5463de18c650b3afbc4652e6f73c6d0b35adc6663786
                        • Opcode Fuzzy Hash: 59a20833c65ddb9c069bd4fc6c699aa1ef8adc516a47ff8223db9a6a44e0b837
                        • Instruction Fuzzy Hash: 27513931128201AFDB14EF94D885E6EBBE8FF89314F04491DF585872A1DB71E924CF52
                        APIs
                        • GetMenu.USER32(?), ref: 002A5864
                        • GetMenuItemCount.USER32(00000000), ref: 002A589B
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 002A58C3
                        • GetMenuItemID.USER32(?,?), ref: 002A5932
                        • GetSubMenu.USER32(?,?), ref: 002A5940
                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 002A5991
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$Item$CountMessagePostString
                        • String ID:
                        • API String ID: 650687236-0
                        • Opcode ID: 98c6e6757e52e2d0fc44be1a60b469fb24efce73c4d03587319c7eb40fdb3906
                        • Instruction ID: 2ee720c85c54b34c7519928803dfc757897330c77d443c6d7152eb677137f143
                        • Opcode Fuzzy Hash: 98c6e6757e52e2d0fc44be1a60b469fb24efce73c4d03587319c7eb40fdb3906
                        • Instruction Fuzzy Hash: 4351AC31A10A26EFCF14EFA4C845AAFB7B4EF49320F104069E905BB351CB74AE518F90
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 0027F218
                        • VariantClear.OLEAUT32(00000013), ref: 0027F28A
                        • VariantClear.OLEAUT32(00000000), ref: 0027F2E5
                        • _memmove.LIBCMT ref: 0027F30F
                        • VariantClear.OLEAUT32(?), ref: 0027F35C
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0027F38A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType_memmove
                        • String ID:
                        • API String ID: 1101466143-0
                        • Opcode ID: 85e20a332882e9f2c3ccd7b6dd4c08ac759199519d11dafb6e9f1c379474c170
                        • Instruction ID: c3272ea389ab5909b769e1fbfcdd21f56fd4c7dadce1ec2d70d164dd5e0fe193
                        • Opcode Fuzzy Hash: 85e20a332882e9f2c3ccd7b6dd4c08ac759199519d11dafb6e9f1c379474c170
                        • Instruction Fuzzy Hash: 975169B5A10209EFDB14CF68C884AAAB7B8FF4C314B158569EE59DB301D730E911CFA0
                        APIs
                        • _memset.LIBCMT ref: 00282550
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0028259B
                        • IsMenu.USER32(00000000), ref: 002825BB
                        • CreatePopupMenu.USER32 ref: 002825EF
                        • GetMenuItemCount.USER32(000000FF), ref: 0028264D
                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 0028267E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                        • String ID:
                        • API String ID: 3311875123-0
                        • Opcode ID: 7724d241987d0eed300915ce9b7c87613f8d2e3613e93c7265575c00dbf9ec8d
                        • Instruction ID: 54a2b3098bc4b93bbcad55edd36e718f32dfdfb4c7716e47f1ca16c462767230
                        • Opcode Fuzzy Hash: 7724d241987d0eed300915ce9b7c87613f8d2e3613e93c7265575c00dbf9ec8d
                        • Instruction Fuzzy Hash: DA51C374A12216DFCF24EF68D988AADBBF8FF05314F144159E811A72D0EB709968CB51
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 0022179A
                        • GetWindowRect.USER32(?,?), ref: 002217FE
                        • ScreenToClient.USER32(?,?), ref: 0022181B
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0022182C
                        • EndPaint.USER32(?,?), ref: 00221876
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                        • String ID:
                        • API String ID: 1827037458-0
                        • Opcode ID: 697ed134a42354a3c78679244197a370bc8dd8110180b277370c9d351421862c
                        • Instruction ID: 6a0cca80dfbaf970e4d5df96ed200c933372e93765f96b312f885b363e084081
                        • Opcode Fuzzy Hash: 697ed134a42354a3c78679244197a370bc8dd8110180b277370c9d351421862c
                        • Instruction Fuzzy Hash: E041D130120661AFD711DF64ECC8F767BE8FB56724F040269FAA48A1A1C7709865CB62
                        APIs
                        • ShowWindow.USER32(002E57B0,00000000,011D52B8,?,?,002E57B0,?,002AB5DC,?,?), ref: 002AB746
                        • EnableWindow.USER32(00000000,00000000), ref: 002AB76A
                        • ShowWindow.USER32(002E57B0,00000000,011D52B8,?,?,002E57B0,?,002AB5DC,?,?), ref: 002AB7CA
                        • ShowWindow.USER32(00000000,00000004,?,002AB5DC,?,?), ref: 002AB7DC
                        • EnableWindow.USER32(00000000,00000001), ref: 002AB800
                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 002AB823
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: 8c02bf25ac2c83d45791764a73838ee87cbc6353be2a6e1b817dbd2f6d051c19
                        • Instruction ID: 960435317d579ae4362ffae6f8f757a44f4915cc663870934eaa2cb06312f9f5
                        • Opcode Fuzzy Hash: 8c02bf25ac2c83d45791764a73838ee87cbc6353be2a6e1b817dbd2f6d051c19
                        • Instruction Fuzzy Hash: FC41B535610141EFDB23CF28C889BA0BBE4FF46300F1841B9E9488F2A3CB75A895CB50
                        APIs
                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00294F57,?,?,00000000,00000001), ref: 002971C1
                          • Part of subcall function 00293AB6: GetWindowRect.USER32(?,?), ref: 00293AC9
                        • GetDesktopWindow.USER32 ref: 002971EB
                        • GetWindowRect.USER32(00000000), ref: 002971F2
                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00297224
                          • Part of subcall function 002852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00285363
                        • GetCursorPos.USER32(?), ref: 00297250
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 002972AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                        • String ID:
                        • API String ID: 4137160315-0
                        • Opcode ID: f930bda80f383cabc1de835e27de1e6de8ec15ab804f3c22ade69aaf0a4495ad
                        • Instruction ID: 0377a083ee5be49dee81252af2867efd112dfc3882d2020e5f49f1f07baed113
                        • Opcode Fuzzy Hash: f930bda80f383cabc1de835e27de1e6de8ec15ab804f3c22ade69aaf0a4495ad
                        • Instruction Fuzzy Hash: E1310672529306AFC720DF54D849B9BB7E9FF89304F000929F98997191CB34E918CB92
                        APIs
                          • Part of subcall function 002783D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002783E8
                          • Part of subcall function 002783D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002783F2
                          • Part of subcall function 002783D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00278401
                          • Part of subcall function 002783D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00278408
                          • Part of subcall function 002783D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0027841E
                        • GetLengthSid.ADVAPI32(?,00000000,00278757), ref: 00278B8C
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00278B98
                        • HeapAlloc.KERNEL32(00000000), ref: 00278B9F
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00278BB8
                        • GetProcessHeap.KERNEL32(00000000,00000000,00278757), ref: 00278BCC
                        • HeapFree.KERNEL32(00000000), ref: 00278BD3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: e63421040ca890154f3b2f78ffae4db836d76b59c5cdb3614056a3d694bf3e01
                        • Instruction ID: 769e20fd154f18cbdfb7a0da1580552b1290e479e40f848cbabeefbd7e8055aa
                        • Opcode Fuzzy Hash: e63421040ca890154f3b2f78ffae4db836d76b59c5cdb3614056a3d694bf3e01
                        • Instruction Fuzzy Hash: 7D11EEB1661206FFDB508FA4DC0DFAE7BA9EB46319F108028E849D3210DB369A11CB60
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0027890A
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00278911
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00278920
                        • CloseHandle.KERNEL32(00000004), ref: 0027892B
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0027895A
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 0027896E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: bd65318bedb046a392f7e464627c9da48c8885b30cd8f642d46822821cd9c7c0
                        • Instruction ID: a14aa0b99ba61c15b889e23890e13936dbe82cf3055f1a64c11c23c426765910
                        • Opcode Fuzzy Hash: bd65318bedb046a392f7e464627c9da48c8885b30cd8f642d46822821cd9c7c0
                        • Instruction Fuzzy Hash: EF115C7254024EEBDF018FA4ED4DBEA7BA9EF0A308F044064FE04A2160CB758D60DB61
                        APIs
                        • GetDC.USER32(00000000), ref: 0027BA77
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0027BA88
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0027BA8F
                        • ReleaseDC.USER32(00000000,00000000), ref: 0027BA97
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0027BAAE
                        • MulDiv.KERNEL32(000009EC,?,?), ref: 0027BAC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: 56ba1ce6d9850721900a8dc773846ec6bc55bd3894e98eb7e556bfcbf99aef97
                        • Instruction ID: 0c6a47f471860333bfa7e7f5f5b26bc02b510e8b6fe4f6a130ce212e98a9317c
                        • Opcode Fuzzy Hash: 56ba1ce6d9850721900a8dc773846ec6bc55bd3894e98eb7e556bfcbf99aef97
                        • Instruction Fuzzy Hash: 32017175E00319BBEB109BE59D49A5EBFB8EB49711F004065FA08A7291DA359910CF90
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00240313
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 0024031B
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00240326
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00240331
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00240339
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00240341
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 3448ea43650c14ee627b6924aaba1868e30041157131772cb18e62501c6f9f0d
                        • Instruction ID: a3ec5f03091ed4a5c5c30b0b4720d1b25519f379ab2c1ba95de9e19088de3701
                        • Opcode Fuzzy Hash: 3448ea43650c14ee627b6924aaba1868e30041157131772cb18e62501c6f9f0d
                        • Instruction Fuzzy Hash: 8D016CB09017597DE3008F5A8C85B52FFA8FF19754F00411BA15C47941C7F5A864CFE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 002854A0
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 002854B6
                        • GetWindowThreadProcessId.USER32(?,?), ref: 002854C5
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002854D4
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002854DE
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 002854E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 6023ea1356b43582d314992b76e7b071ad7f3e8528f8c7005089d1c3a0520ff7
                        • Instruction ID: e6e6a4c285971b9895110d00fbd0029906b61563a5699e92aaa2389d74b5a3f5
                        • Opcode Fuzzy Hash: 6023ea1356b43582d314992b76e7b071ad7f3e8528f8c7005089d1c3a0520ff7
                        • Instruction Fuzzy Hash: 74F01D32241158BBE7715BE2ED0DEAB7A7CEBCBB11F000169FA14D10909AA91A0186B5
                        APIs
                        • InterlockedExchange.KERNEL32(?,?), ref: 002872EC
                        • EnterCriticalSection.KERNEL32(?,?,00231044,?,?), ref: 002872FD
                        • TerminateThread.KERNEL32(00000000,000001F6,?,00231044,?,?), ref: 0028730A
                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00231044,?,?), ref: 00287317
                          • Part of subcall function 00286CDE: CloseHandle.KERNEL32(00000000,?,00287324,?,00231044,?,?), ref: 00286CE8
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 0028732A
                        • LeaveCriticalSection.KERNEL32(?,?,00231044,?,?), ref: 00287331
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: b859d2c3617705a7e03f748e3d3b7784fcb8fe0dc74c28dc68fe0b9df1377368
                        • Instruction ID: 121f5d56c224482ed6fe8ff55da258c51cafa23e1a829168ef87f506d219638c
                        • Opcode Fuzzy Hash: b859d2c3617705a7e03f748e3d3b7784fcb8fe0dc74c28dc68fe0b9df1377368
                        • Instruction Fuzzy Hash: 9CF0893A141712EBD7A12FA4FE8CADB7739FF46302B140531F902910A0CF795811CB50
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00278C5F
                        • UnloadUserProfile.USERENV(?,?), ref: 00278C6B
                        • CloseHandle.KERNEL32(?), ref: 00278C74
                        • CloseHandle.KERNEL32(?), ref: 00278C7C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00278C85
                        • HeapFree.KERNEL32(00000000), ref: 00278C8C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: 21c6f92b3dc9cf5cd186ab64d0dbebc86cf2395a7ba424d49dbcdf2e45fc2580
                        • Instruction ID: 34e8515ff98b671708850325f9feca248b8d5f0146d2269e19d72bdc30dd85d0
                        • Opcode Fuzzy Hash: 21c6f92b3dc9cf5cd186ab64d0dbebc86cf2395a7ba424d49dbcdf2e45fc2580
                        • Instruction Fuzzy Hash: 50E05276104505FFDB811FE5FE0C95ABB69FB8A762B508631F21981470CF3A9461DB50
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,002B2C7C,?), ref: 00277A12
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,002B2C7C,?), ref: 00277A2A
                        • CLSIDFromProgID.OLE32(?,?,00000000,002AFB80,000000FF,?,00000000,00000800,00000000,?,002B2C7C,?), ref: 00277A4F
                        • _memcmp.LIBCMT ref: 00277A70
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID: ,,+
                        • API String ID: 314563124-1536947320
                        • Opcode ID: afe9dd4b0573b97b76b6c9721de85a7fddc055781ab764cab9e26cb62afd3d9a
                        • Instruction ID: 298b3dc27a42a3eab8ad0e08142c8ab3e3da377675c2279156e79728a423372b
                        • Opcode Fuzzy Hash: afe9dd4b0573b97b76b6c9721de85a7fddc055781ab764cab9e26cb62afd3d9a
                        • Instruction Fuzzy Hash: 19813D71A1010AEFCB04DFD4C988EEEB7B9FF89315F208598E515AB250DB71AE15CB60
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00298728
                        • CharUpperBuffW.USER32(?,?), ref: 00298837
                        • VariantClear.OLEAUT32(?), ref: 002989AF
                          • Part of subcall function 0028760B: VariantInit.OLEAUT32(00000000), ref: 0028764B
                          • Part of subcall function 0028760B: VariantCopy.OLEAUT32(00000000,?), ref: 00287654
                          • Part of subcall function 0028760B: VariantClear.OLEAUT32(00000000), ref: 00287660
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4237274167-1221869570
                        • Opcode ID: c8616bb4cdad3c6dcb19180c759ff6ed15d70b0d2dc2696610a715e3a7778675
                        • Instruction ID: 9f3a4a6e2b2fe12545c53643c80f32e2cdc222f11817c3bb35125ae4166fe18e
                        • Opcode Fuzzy Hash: c8616bb4cdad3c6dcb19180c759ff6ed15d70b0d2dc2696610a715e3a7778675
                        • Instruction Fuzzy Hash: AE919F75628301DFCB10DF64C48096ABBE4EF89314F18896EF88A8B361DB31E955CF52
                        APIs
                          • Part of subcall function 0023FE06: _wcscpy.LIBCMT ref: 0023FE29
                        • _memset.LIBCMT ref: 00282E7F
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00282EAE
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00282F61
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00282F8F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                        • String ID: 0
                        • API String ID: 4152858687-4108050209
                        • Opcode ID: f640c960c99bba43f13df046037207797970aeade7c4ff4a7a69127eeb481c6c
                        • Instruction ID: be9f30e0720af9a7bdfb59fd5371b3a0f4ffadd324f34750f24c92904f6b601e
                        • Opcode Fuzzy Hash: f640c960c99bba43f13df046037207797970aeade7c4ff4a7a69127eeb481c6c
                        • Instruction Fuzzy Hash: 3151DF7553A312DED724EF28D84466BB7E4EFA5310F040A2DFA84D25E0DB70D968CB92
                        APIs
                        • _memset.LIBCMT ref: 00282AB8
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00282AD4
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00282B1A
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,002E5890,00000000), ref: 00282B63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem_memset
                        • String ID: 0
                        • API String ID: 1173514356-4108050209
                        • Opcode ID: c1fa6384a2707abba3578077958ba55e524c7a0e7033f2ef44a0c025de6ea2fe
                        • Instruction ID: 75b8559376c9ac33e31479127f8c5628c9829ce903cea7dfb163cb7c42159370
                        • Opcode Fuzzy Hash: c1fa6384a2707abba3578077958ba55e524c7a0e7033f2ef44a0c025de6ea2fe
                        • Instruction Fuzzy Hash: 8B41D234216302DFD720EF24D885B2ABBE8AF85324F10461DF865972D1D770E928CB62
                        APIs
                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0029D8D9
                          • Part of subcall function 002279AB: _memmove.LIBCMT ref: 002279F9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharLower_memmove
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 3425801089-567219261
                        • Opcode ID: 395e2724454cebb348f7009274b3bf951cb53400698b826c4293363c9590d34b
                        • Instruction ID: 9a834310893bc39b5e916e5e3176315798f39158fb56e7f37e9dc3e7eb327116
                        • Opcode Fuzzy Hash: 395e2724454cebb348f7009274b3bf951cb53400698b826c4293363c9590d34b
                        • Instruction Fuzzy Hash: 0331B270524616ABDF00EF94C8D19EEB3B4FF05710B108A6AE865973D1DB71AD65CF80
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 002791D6
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 002791E9
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00279219
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$_memmove$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 365058703-1403004172
                        • Opcode ID: bef7f8cd5aad56a486cd8f7225bf56f213432a5deb23ce4866f567651dc44642
                        • Instruction ID: d09fdbf791b448af13043c4be4f0528f264bcceaafe784fc033416f5a413ff04
                        • Opcode Fuzzy Hash: bef7f8cd5aad56a486cd8f7225bf56f213432a5deb23ce4866f567651dc44642
                        • Instruction Fuzzy Hash: 3921F8719242047FDB14ABB4DC8ACFEB778DF46360B148129F829972E1DF790D699A10
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00291962
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00291988
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 002919B8
                        • InternetCloseHandle.WININET(00000000), ref: 002919FF
                          • Part of subcall function 00292599: GetLastError.KERNEL32(?,?,0029192D,00000000,00000000,00000001), ref: 002925AE
                          • Part of subcall function 00292599: SetEvent.KERNEL32(?,?,0029192D,00000000,00000000,00000001), ref: 002925C3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 0cec69604eb53fbd88c42d75b2346e5490014e5609fca53b8e1e9ac48ef0d601
                        • Instruction ID: 35faca627524677dd3c299fe313683322f1eb79bc8591a5251e318a46ef27bcf
                        • Opcode Fuzzy Hash: 0cec69604eb53fbd88c42d75b2346e5490014e5609fca53b8e1e9ac48ef0d601
                        • Instruction Fuzzy Hash: C421D4B162020ABFEF11DFA5DD95EBF77ACEB49744F10012AF40592200EF649E259BA1
                        APIs
                          • Part of subcall function 00221D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00221D73
                          • Part of subcall function 00221D35: GetStockObject.GDI32(00000011), ref: 00221D87
                          • Part of subcall function 00221D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00221D91
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 002A6493
                        • LoadLibraryW.KERNEL32(?), ref: 002A649A
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 002A64AF
                        • DestroyWindow.USER32(?), ref: 002A64B7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                        • String ID: SysAnimate32
                        • API String ID: 4146253029-1011021900
                        • Opcode ID: fd2b19b2bd481c0a0d6035a3818a809290f4568c8cb92f103889376c0b323cad
                        • Instruction ID: fc3c47c868329705e798bb634069127a753119544946621a374f724aeb329232
                        • Opcode Fuzzy Hash: fd2b19b2bd481c0a0d6035a3818a809290f4568c8cb92f103889376c0b323cad
                        • Instruction Fuzzy Hash: 0B21D771120606AFEF204F64EC88EBB77ADEF5E764F188615FA1096190CB71CC619760
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00286E65
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00286E98
                        • GetStdHandle.KERNEL32(0000000C), ref: 00286EAA
                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00286EE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: 612ebfbe63170773701852c9f679291081e4cb4d37e0c3de7957867f415f44d7
                        • Instruction ID: 5299c5ae759a5089c6493ab14c0df82147c155e762c0a3c32292b8ac2831aaf5
                        • Opcode Fuzzy Hash: 612ebfbe63170773701852c9f679291081e4cb4d37e0c3de7957867f415f44d7
                        • Instruction Fuzzy Hash: 3C21627D621206ABDB20AF69DC4DE9A77F4AF55720F204629FDA0D72D0DB7098608B50
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00286F32
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00286F64
                        • GetStdHandle.KERNEL32(000000F6), ref: 00286F75
                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00286FAF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateHandle$FilePipe
                        • String ID: nul
                        • API String ID: 4209266947-2873401336
                        • Opcode ID: 77e14b6d1f42eff6b2d92cad05bcb923c517d4d5ea93ed9e6a1fcf79609e9346
                        • Instruction ID: 3e18c9c4f095def6a962973e102073e3a73af36fe1f89146a4d335a3d083db3f
                        • Opcode Fuzzy Hash: 77e14b6d1f42eff6b2d92cad05bcb923c517d4d5ea93ed9e6a1fcf79609e9346
                        • Instruction Fuzzy Hash: 7E21D6796113069BDB20AF68AC0CB9977E8FF55320F204659FEA2D3AD0DB70D8618B50
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 0028ACDE
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0028AD32
                        • __swprintf.LIBCMT ref: 0028AD4B
                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,002AF910), ref: 0028AD89
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume__swprintf
                        • String ID: %lu
                        • API String ID: 3164766367-685833217
                        • Opcode ID: 5b2f8775599e3dec63d0bd426933396e8f9731f27a7d82d9ed64e670502221a9
                        • Instruction ID: c11067a665e896f51ebd327dc8ce1214f93a2fe17f016faea58b546c0c078358
                        • Opcode Fuzzy Hash: 5b2f8775599e3dec63d0bd426933396e8f9731f27a7d82d9ed64e670502221a9
                        • Instruction Fuzzy Hash: 6F218334A10209AFCB10EFA4DD85EAE77B8EF49704B104069F509DB252DF71EA55CF61
                        APIs
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                          • Part of subcall function 0027A15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0027A179
                          • Part of subcall function 0027A15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0027A18C
                          • Part of subcall function 0027A15C: GetCurrentThreadId.KERNEL32 ref: 0027A193
                          • Part of subcall function 0027A15C: AttachThreadInput.USER32(00000000), ref: 0027A19A
                        • GetFocus.USER32 ref: 0027A334
                          • Part of subcall function 0027A1A5: GetParent.USER32(?), ref: 0027A1B3
                        • GetClassNameW.USER32(?,?,00000100), ref: 0027A37D
                        • EnumChildWindows.USER32(?,0027A3F5), ref: 0027A3A5
                        • __swprintf.LIBCMT ref: 0027A3BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                        • String ID: %s%d
                        • API String ID: 1941087503-1110647743
                        • Opcode ID: 0a0c0941591c52e12df2b522262c5cef551d1d34d9c05cd0bc82225bf25bc7f1
                        • Instruction ID: 44e7fe5cb2174815c47174deb233d2926c9512d5bdae5525dd301b910f415e35
                        • Opcode Fuzzy Hash: 0a0c0941591c52e12df2b522262c5cef551d1d34d9c05cd0bc82225bf25bc7f1
                        • Instruction Fuzzy Hash: 7D11A2716242197BDF11BFA0EC85FEE777CAF85710F0080B5B91CAA142CA7459658F71
                        APIs
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0029ED1B
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0029ED4B
                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0029EE7E
                        • CloseHandle.KERNEL32(?), ref: 0029EEFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                        • String ID:
                        • API String ID: 2364364464-0
                        • Opcode ID: 086b94f91c5d92917a1331f914c907c08af8c820a7e37958a24d1abb9800a37d
                        • Instruction ID: f230047803395d71acbce96848eef48380b0638e5f851c6f52e54970d420b874
                        • Opcode Fuzzy Hash: 086b94f91c5d92917a1331f914c907c08af8c820a7e37958a24d1abb9800a37d
                        • Instruction Fuzzy Hash: 96817571620311AFDB20DF64D846F2AB7E5AF48720F15881DF599D7292DBB0EC508F51
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 002A0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0029FE38,?,?), ref: 002A0EBC
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002A0188
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002A01C7
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 002A020E
                        • RegCloseKey.ADVAPI32(?,?), ref: 002A023A
                        • RegCloseKey.ADVAPI32(00000000), ref: 002A0247
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                        • String ID:
                        • API String ID: 3440857362-0
                        • Opcode ID: 7b936200c745beaac49cb29c0d3d94b144ce839fb816ba53de7aeebbf2192fbc
                        • Instruction ID: 764b0b9e06f41eccb2142994419012342c3d9bde39ea921bc1eba0f025279f02
                        • Opcode Fuzzy Hash: 7b936200c745beaac49cb29c0d3d94b144ce839fb816ba53de7aeebbf2192fbc
                        • Instruction Fuzzy Hash: 29514971228205AFD704EFA4D885F6AB7E8FF89304F04892DB59987291DB71E924CF52
                        APIs
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0029DA3B
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0029DABE
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 0029DADA
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0029DB1B
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0029DB35
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0028793F,?,?,00000000), ref: 00225B8C
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0028793F,?,?,00000000,?,?), ref: 00225BB0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                        • String ID:
                        • API String ID: 327935632-0
                        • Opcode ID: 3e06e7f46cfbbc1ee68fc7ca83347c27fc07c70b6d0a377a2d2c76aa362edefd
                        • Instruction ID: 299f4c33aeeea633fd9b6853d162f734f9deb655bfa4f2165bd73ef8d98ea837
                        • Opcode Fuzzy Hash: 3e06e7f46cfbbc1ee68fc7ca83347c27fc07c70b6d0a377a2d2c76aa362edefd
                        • Instruction Fuzzy Hash: 2C514735A14216EFDB00EFA8D4959ADB7F4FF19324B04C069E819AB311DB30AD65CF90
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0028E6AB
                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0028E6D4
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0028E713
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0028E738
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0028E740
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                        • String ID:
                        • API String ID: 1389676194-0
                        • Opcode ID: 1361b25ba15d6924892ba8618ed1f5c87744c8417c036ab75bff472c2c222af0
                        • Instruction ID: ab6dd9b181a5c72aa558c56f7b47e98dc4ffa456cd332daab2408c5ba7b209e4
                        • Opcode Fuzzy Hash: 1361b25ba15d6924892ba8618ed1f5c87744c8417c036ab75bff472c2c222af0
                        • Instruction Fuzzy Hash: F0513B35A10215EFDF10EFA4D985AADBBF5EF08310B148099E849AB361CB31ED61CF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 878abe3f387512fff934aa1ab3b2c05dae866626f0367d6df25b16f1117062d4
                        • Instruction ID: 347522505b99da9a4fa6d1452b7a3b1e6eefd027bae1f62d4e83e199f2289c8a
                        • Opcode Fuzzy Hash: 878abe3f387512fff934aa1ab3b2c05dae866626f0367d6df25b16f1117062d4
                        • Instruction Fuzzy Hash: F2411835920255BFC720DF68DC49FA9BBA4EF0B310F150165F81AA72E1CF709D61DA61
                        APIs
                        • GetCursorPos.USER32(?), ref: 00222357
                        • ScreenToClient.USER32(002E57B0,?), ref: 00222374
                        • GetAsyncKeyState.USER32(00000001), ref: 00222399
                        • GetAsyncKeyState.USER32(00000002), ref: 002223A7
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: 35978ce0c355fcc6a71a3262d390f19fa9fce260f0d9a829237f811a581f002d
                        • Instruction ID: 66eda924deda5ba41194208974d6cb4f1717dffd064bbfb543c57875f26df50d
                        • Opcode Fuzzy Hash: 35978ce0c355fcc6a71a3262d390f19fa9fce260f0d9a829237f811a581f002d
                        • Instruction Fuzzy Hash: A541B635918116FFCF15DFA4D844AEDBB74FB05320F204366F82892291DB756968DF90
                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0027673D
                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00276789
                        • TranslateMessage.USER32(?), ref: 002767B2
                        • DispatchMessageW.USER32(?), ref: 002767BC
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002767CB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                        • String ID:
                        • API String ID: 2108273632-0
                        • Opcode ID: d1024aae19ddcccb638a0f820e1ad6e3a979a7d488e34097019067a38b2fb29d
                        • Instruction ID: edda1927430c8c8a47087999d6ba80dcb25e7401492f97cf1770baaf309739d4
                        • Opcode Fuzzy Hash: d1024aae19ddcccb638a0f820e1ad6e3a979a7d488e34097019067a38b2fb29d
                        • Instruction Fuzzy Hash: 4431C530960A579FDB248FB0AC8CFB6BBACEB05748F148125E429C61A1E7749869DB50
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00278CF2
                        • PostMessageW.USER32(?,00000201,00000001), ref: 00278D9C
                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00278DA4
                        • PostMessageW.USER32(?,00000202,00000000), ref: 00278DB2
                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00278DBA
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: f646dc35f491bd1153252cd6bfcf1e0c9e94496e75a412d0523d10068c4f72d9
                        • Instruction ID: a96a7ef111622f84285d4e14c5d8a2d34cfefef9062fa0cc9bc5f0e3cf409753
                        • Opcode Fuzzy Hash: f646dc35f491bd1153252cd6bfcf1e0c9e94496e75a412d0523d10068c4f72d9
                        • Instruction Fuzzy Hash: 2631C07150021AEFDF24CFB8E94DA9E3BB5EB15315F108229F929E61D0CBB49924DB90
                        APIs
                        • IsWindowVisible.USER32(?), ref: 0027B4C6
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0027B4E3
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0027B51B
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0027B541
                        • _wcsstr.LIBCMT ref: 0027B54B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                        • String ID:
                        • API String ID: 3902887630-0
                        • Opcode ID: 00f65310bee3474812fd42c7a9c114e4b3bf25407b6e4fc5ebe3dba09538264f
                        • Instruction ID: 0b3e29921f97d34101f8258ec13a00bdfa0ce1727923a4c5742e4fe58f9bb5c4
                        • Opcode Fuzzy Hash: 00f65310bee3474812fd42c7a9c114e4b3bf25407b6e4fc5ebe3dba09538264f
                        • Instruction Fuzzy Hash: 1B21DA32624101BBEB269F799C49F7B7B9CDF45760F008039F909DA161EFB5DC6096A0
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • GetWindowLongW.USER32(?,000000F0), ref: 002AB1C6
                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 002AB1EB
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 002AB203
                        • GetSystemMetrics.USER32(00000004), ref: 002AB22C
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00290FA5,00000000), ref: 002AB24A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Long$MetricsSystem
                        • String ID:
                        • API String ID: 2294984445-0
                        • Opcode ID: 40846f242bd66179e7f294fec7292f522af0034341d76214148d37e1633eda96
                        • Instruction ID: aa38165ba96e0499f4ebf6caec2f31ad874c53ab35f013cb85138ff30929d60f
                        • Opcode Fuzzy Hash: 40846f242bd66179e7f294fec7292f522af0034341d76214148d37e1633eda96
                        • Instruction Fuzzy Hash: 43218031930666AFCB219F789C08B6A37A4EB06725F104739FD26D61E1EB309864DB90
                        APIs
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 002795E2
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00279614
                        • __itow.LIBCMT ref: 0027962C
                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00279654
                        • __itow.LIBCMT ref: 00279665
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$__itow$_memmove
                        • String ID:
                        • API String ID: 2983881199-0
                        • Opcode ID: 1df73f06d30fe47eae5f184ad85a6a7715f2d7624bd743d0ae5437165fbba3e6
                        • Instruction ID: 1e1399766499c31c2cca1b96004cf5d1de071b9bfa1034084cba2b96d362780a
                        • Opcode Fuzzy Hash: 1df73f06d30fe47eae5f184ad85a6a7715f2d7624bd743d0ae5437165fbba3e6
                        • Instruction Fuzzy Hash: 8C21DA317203157FDB149FA49C8AEEE7BACDF59720F044129FD08D7251DA708DA58B91
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0022134D
                        • SelectObject.GDI32(?,00000000), ref: 0022135C
                        • BeginPath.GDI32(?), ref: 00221373
                        • SelectObject.GDI32(?,00000000), ref: 0022139C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 8e152ffc9ca663776cbcc4b5cfbc7552e234f545cc3b68e85902de4c71cc67cf
                        • Instruction ID: 79d7c966460434164697f4d5ebd25ecde47e5a60dfcf9645ab9df3bb81a1cd1d
                        • Opcode Fuzzy Hash: 8e152ffc9ca663776cbcc4b5cfbc7552e234f545cc3b68e85902de4c71cc67cf
                        • Instruction Fuzzy Hash: B321AE30820669EBDB10CFA4FC8CB697BE9FB10325F144266F8009A0B0D7B588B1CF80
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00284B61
                        • __beginthreadex.LIBCMT ref: 00284B7F
                        • MessageBoxW.USER32(?,?,?,?), ref: 00284B94
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00284BAA
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00284BB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                        • String ID:
                        • API String ID: 3824534824-0
                        • Opcode ID: 9c9f58a9c2ab5daa1dc6cf4977a91d95d6533585a7d28b34d4b806291372b8ad
                        • Instruction ID: db8672411f3c3b9a5991863f02ad830eaebe2b9a79168b924867100257e8b4f9
                        • Opcode Fuzzy Hash: 9c9f58a9c2ab5daa1dc6cf4977a91d95d6533585a7d28b34d4b806291372b8ad
                        • Instruction Fuzzy Hash: AF114876915655BBCB40AFB8AC48A9A7FACAB45328F140265FD14D3290C675CD108BA0
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00278546
                        • GetLastError.KERNEL32(?,0027800A,?,?,?), ref: 00278550
                        • GetProcessHeap.KERNEL32(00000008,?,?,0027800A,?,?,?), ref: 0027855F
                        • HeapAlloc.KERNEL32(00000000,?,0027800A,?,?,?), ref: 00278566
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0027857D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 67290a9b033574f7a50665a543f049ce2d90181829a3097ac87d90629a341874
                        • Instruction ID: 757377bd3e9cec9102663814b8d6d19cbe383e0dc06d9fffee625a736ef4242c
                        • Opcode Fuzzy Hash: 67290a9b033574f7a50665a543f049ce2d90181829a3097ac87d90629a341874
                        • Instruction Fuzzy Hash: 820146B1250205EFDB214FA6ED4DD6B7BACEF8A755B54456AF909C2220DE328D10CA60
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00285307
                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00285315
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 0028531D
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00285327
                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00285363
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: 0969109957f141c3320528ec4082379308dcab0e409c7275d486e7c388fb679c
                        • Instruction ID: 9c74929bae2525af8891bf4cf425da9167c341af8059b594790fba3035c1b40f
                        • Opcode Fuzzy Hash: 0969109957f141c3320528ec4082379308dcab0e409c7275d486e7c388fb679c
                        • Instruction Fuzzy Hash: 12016D35C22A2DDBCF00AFE4E98CAEDBBB8FB09301F050499E945F2180CF7455659BA1
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?,?,0027777D), ref: 0027744F
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?), ref: 0027746A
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?), ref: 00277478
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?), ref: 00277488
                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0027736C,80070057,?,?), ref: 00277494
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: c0531d629636e3e6ce8781a04e0f0ca7838f0ea276fca2d2b4b16d33bcf68fd4
                        • Instruction ID: ac76eed5bbbf5a042ebc2b8cecdb87fc5444b8d82f97fbdedc7f432e5775d851
                        • Opcode Fuzzy Hash: c0531d629636e3e6ce8781a04e0f0ca7838f0ea276fca2d2b4b16d33bcf68fd4
                        • Instruction Fuzzy Hash: 5801B176610305BFDB104F64ED08AAA7FBCEB45752F108064F908D2220DB75DD109BA0
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002783E8
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002783F2
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00278401
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00278408
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0027841E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: a10b6e6417f096d7e903a890d52eda0190988f3522bd984f586b381cbe59528e
                        • Instruction ID: ed085676c5832db562c9aa0bd9f5bf5e17ec9983d28cc68094d067dcebb52bf9
                        • Opcode Fuzzy Hash: a10b6e6417f096d7e903a890d52eda0190988f3522bd984f586b381cbe59528e
                        • Instruction Fuzzy Hash: F6F0CD30254206EFEB601FA4EC9CE6B3BACEF8A755B004029F909C2150CFB49C51DA61
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00278449
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00278453
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00278462
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00278469
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0027847F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: d7abefb8054c0c37de24869b21f7cd549d0e8dec1b286c7dab2af5f599138470
                        • Instruction ID: c8ecedd1f01bb4110d1427aa8064b1b359a361cfb7d3881cf0d33913f2341ef4
                        • Opcode Fuzzy Hash: d7abefb8054c0c37de24869b21f7cd549d0e8dec1b286c7dab2af5f599138470
                        • Instruction Fuzzy Hash: F4F0A930250306AFEBA11FA4EC9DE6B3BACEF8A765B044029F909C3150CFB49810DA60
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 0027C4B9
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 0027C4D0
                        • MessageBeep.USER32(00000000), ref: 0027C4E8
                        • KillTimer.USER32(?,0000040A), ref: 0027C504
                        • EndDialog.USER32(?,00000001), ref: 0027C51E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: a005529eefc44b1c5fc664c71c93bdef0c334ee5e385e73d81a2d0ad93e8c211
                        • Instruction ID: 357e476e03795798563c935115efa0d15f8e5ad03ce099181091351a4f3fa43e
                        • Opcode Fuzzy Hash: a005529eefc44b1c5fc664c71c93bdef0c334ee5e385e73d81a2d0ad93e8c211
                        • Instruction Fuzzy Hash: C201A230410304ABEB205F70ED4EBA677BCFF01B05F04466DE596A14E1DBF569688A80
                        APIs
                        • EndPath.GDI32(?), ref: 002213BF
                        • StrokeAndFillPath.GDI32(?,?,0025BA08,00000000,?), ref: 002213DB
                        • SelectObject.GDI32(?,00000000), ref: 002213EE
                        • DeleteObject.GDI32 ref: 00221401
                        • StrokePath.GDI32(?), ref: 0022141C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: 130b6bafe142b2bc0c609a1db07f25e292482d203b7e455640efca303e29e027
                        • Instruction ID: 06c57f9528fba006d346c289de8d8c6651d414cc0cef3383e547b55cc8c9f5fe
                        • Opcode Fuzzy Hash: 130b6bafe142b2bc0c609a1db07f25e292482d203b7e455640efca303e29e027
                        • Instruction Fuzzy Hash: B8F01930060B59EBDB559FA6FD8CB583BE5AB1132AF088224E469880F1CB7549A5DF10
                        APIs
                          • Part of subcall function 00240F36: std::exception::exception.LIBCMT ref: 00240F6C
                          • Part of subcall function 00240F36: __CxxThrowException@8.LIBCMT ref: 00240F81
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 00227BB1: _memmove.LIBCMT ref: 00227C0B
                        • __swprintf.LIBCMT ref: 0023302D
                        Strings
                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00232EC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                        • API String ID: 1943609520-557222456
                        • Opcode ID: 119306c83695454d5c7d79b3212c82c5e851d3de43966df9c5b360ebc5794cd5
                        • Instruction ID: f942905f977f0203bfd1b375fdb95d72fef05b600a68af14300657f0832351aa
                        • Opcode Fuzzy Hash: 119306c83695454d5c7d79b3212c82c5e851d3de43966df9c5b360ebc5794cd5
                        • Instruction Fuzzy Hash: ED916D71128312AFC718EF64D895C6EB7A4EF95710F00491DF8869B2A1DB70EE64CF92
                        APIs
                          • Part of subcall function 002248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,002248A1,?,?,002237C0,?), ref: 002248CE
                        • CoInitialize.OLE32(00000000), ref: 0028BA47
                        • CoCreateInstance.OLE32(002B2D6C,00000000,00000001,002B2BDC,?), ref: 0028BA60
                        • CoUninitialize.OLE32 ref: 0028BA7D
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                        • String ID: .lnk
                        • API String ID: 2126378814-24824748
                        • Opcode ID: 2234ec1f0dc90173195b269b06e904e8ba062836f06a68b8814b9d9b33d641fa
                        • Instruction ID: c182ec338b97554fd1c76bf29769ecef2a317c58979d1c368d3bddfb50ae7c33
                        • Opcode Fuzzy Hash: 2234ec1f0dc90173195b269b06e904e8ba062836f06a68b8814b9d9b33d641fa
                        • Instruction Fuzzy Hash: 19A14478614311AFCB10EF54C484D2ABBE5BF89314F14898DF8999B3A1CB31EC55CB91
                        APIs
                        • OleSetContainedObject.OLE32(?,00000001), ref: 0027B780
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ContainedObject
                        • String ID: AutoIt3GUI$Container$%+
                        • API String ID: 3565006973-1591554326
                        • Opcode ID: 0991281d32c9bd0219f938f4e00b2aa43f50d998cd97669dba61b1cfe118bfe0
                        • Instruction ID: ed0087f2a8c5ba81c569ce3d8e21518eb4f9ac081719d402bdecde7adba036bc
                        • Opcode Fuzzy Hash: 0991281d32c9bd0219f938f4e00b2aa43f50d998cd97669dba61b1cfe118bfe0
                        • Instruction Fuzzy Hash: 2F914A71620202AFDB15DF68C884B6ABBF8FF49710F14856EF949CB691DBB0E851CB50
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 0024521D
                          • Part of subcall function 00250270: __87except.LIBCMT ref: 002502AB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorHandling__87except__start
                        • String ID: pow
                        • API String ID: 2905807303-2276729525
                        • Opcode ID: 93ba080180f48910c58cc149073facd6720ae04a35375e59219fa3c5d4dc07a3
                        • Instruction ID: 2f460347cba38889e38e9880f47c8bf6193d7fa0559b58430f46b2d39676b699
                        • Opcode Fuzzy Hash: 93ba080180f48910c58cc149073facd6720ae04a35375e59219fa3c5d4dc07a3
                        • Instruction Fuzzy Hash: 3D517B20A3C603A7DB15AF14DD8537E2B949B40711F20499AECD5861E7EBB48CFC9A4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: #$+
                        • API String ID: 0-2552117581
                        • Opcode ID: 1e1c4e0d7106305e1e7ccd0ccf0cb2a105d16def8a069cbf749315a1e48a693a
                        • Instruction ID: ff152d4459fdadf8cb9aaac1e01f205d5450071bd5674f433c6d3fff98e56146
                        • Opcode Fuzzy Hash: 1e1c4e0d7106305e1e7ccd0ccf0cb2a105d16def8a069cbf749315a1e48a693a
                        • Instruction Fuzzy Hash: 64515535124667DFCF18DF68C485AFAB7A0EF1A314F148055EC959B2D0C7B4ACA2CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove$_free
                        • String ID: Oa#
                        • API String ID: 2620147621-1510357115
                        • Opcode ID: 5a892ce687ae68b9ee0e0f1dd72a1aec89b6b8841d09c0017ca5e43673a87b13
                        • Instruction ID: fadf9d5b55e2a30490c37b266663952cbb7cff1f2802223f87114350bc5be90f
                        • Opcode Fuzzy Hash: 5a892ce687ae68b9ee0e0f1dd72a1aec89b6b8841d09c0017ca5e43673a87b13
                        • Instruction Fuzzy Hash: EE515EB1A283419FD724CF28C481B2ABBE5BF89314F45492DE989C7351DB31DA55CF42
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memset$_memmove
                        • String ID: ERCP
                        • API String ID: 2532777613-1384759551
                        • Opcode ID: ee9b2da1588acc2f7747275ba114b394b7ebe749789e067f2828cfc94b990237
                        • Instruction ID: 041fcd0634b98f6b3480783cb96740844f7a60dc9ec11ff185c3974960671554
                        • Opcode Fuzzy Hash: ee9b2da1588acc2f7747275ba114b394b7ebe749789e067f2828cfc94b990237
                        • Instruction Fuzzy Hash: 2E5184B1920306EBDB24DF55C9857AAB7F8EF04714F20C56EE94ACB241E771E9A4CB40
                        APIs
                          • Part of subcall function 002817ED: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00279558,?,?,00000034,00000800,?,00000034), ref: 00281817
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00279B01
                          • Part of subcall function 002817B8: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00279587,?,?,00000800,?,00001073,00000000,?,?), ref: 002817E2
                          • Part of subcall function 0028170F: GetWindowThreadProcessId.USER32(?,?), ref: 0028173A
                          • Part of subcall function 0028170F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0027951C,00000034,?,?,00001004,00000000,00000000), ref: 0028174A
                          • Part of subcall function 0028170F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0027951C,00000034,?,?,00001004,00000000,00000000), ref: 00281760
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00279B6E
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00279BBB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: 62203a766af85825539d8c560707698934d7679cefa71367377e21657140b11d
                        • Instruction ID: 2fdce4cb6325e28f2683a0c81881b30b87a7418acc9ae85658a75bd505b40b75
                        • Opcode Fuzzy Hash: 62203a766af85825539d8c560707698934d7679cefa71367377e21657140b11d
                        • Instruction Fuzzy Hash: 58416F76911218BFDB10EFA4CC85ADEB7B8EB09700F008099F955B7190CB706E95CFA0
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,002AF910,00000000,?,?,?,?), ref: 002A7A11
                        • GetWindowLongW.USER32 ref: 002A7A2E
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 002A7A3E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: da1fe8e28e6daf267957395cd0d0b8110f089fcbe58e198e5add980bacbdbe8b
                        • Instruction ID: 33e6e4546392dad73f6ceea35e542950b96d759673fd88ae150bb8060d91007b
                        • Opcode Fuzzy Hash: da1fe8e28e6daf267957395cd0d0b8110f089fcbe58e198e5add980bacbdbe8b
                        • Instruction Fuzzy Hash: 9C31BE32224606BBDB118E78DC45BEB77A9EB0A324F204725F875921E1CB31ED618B54
                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 002A7493
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 002A74A7
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 002A74CB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: cfa85f2648686ef43060a3a1d6e4a46bc493be978eef3ccbcf3813f32fb3dfab
                        • Instruction ID: 8623748fd615c52023cf44dbf42d66185cf4fa27e057a002ab48598dcfe8f6a9
                        • Opcode Fuzzy Hash: cfa85f2648686ef43060a3a1d6e4a46bc493be978eef3ccbcf3813f32fb3dfab
                        • Instruction Fuzzy Hash: 5421D332510219BBDF218F90DC46FEA3B79EF4D724F110114FE146B1D0DA75A860CB90
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 002A6D6D
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 002A6D7D
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 002A6DA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: d18fce6f8f4ab4b725d0480d18b95cf7689b1c778b66ff3d36b5f464a54a8547
                        • Instruction ID: d966d9d647a6f3541af03d24501760fa37cff937a22d91e1063e42db49b4478c
                        • Opcode Fuzzy Hash: d18fce6f8f4ab4b725d0480d18b95cf7689b1c778b66ff3d36b5f464a54a8547
                        • Instruction Fuzzy Hash: B021A772720119BFDF128F54DC89FBB3B6AEF8A754F158124F9059B190CB719C618BA0
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 002A77A4
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 002A77B9
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 002A77C6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: 3ec2b293ca3b716382bb4adac567f33f10f81b6419d852c14f59f49275df4b84
                        • Instruction ID: 8f8581595747a2dff8ed16e9230ae54d9066f650301ea896039651b736fef8a3
                        • Opcode Fuzzy Hash: 3ec2b293ca3b716382bb4adac567f33f10f81b6419d852c14f59f49275df4b84
                        • Instruction Fuzzy Hash: 42110A32664209BBEF105F70DC45FE777ADEF8AB14F010118F651960D1DA71E861CB24
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __calloc_crt
                        • String ID: -$@B.
                        • API String ID: 3494438863-912515190
                        • Opcode ID: f23139dead6973903c4b5ddfd2f0ccafaf90bc1b8cb44301b578f18b400bb7b1
                        • Instruction ID: 3c88a092f74c84e8ed329a05b22fb72a431635c430ac01d000a5cfef11b2cff5
                        • Opcode Fuzzy Hash: f23139dead6973903c4b5ddfd2f0ccafaf90bc1b8cb44301b578f18b400bb7b1
                        • Instruction Fuzzy Hash: E7F0C272B78A23CAF76C9F19BC997653795E702328F100427E604CE290E7708CA08A82
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00224C2E), ref: 00224CA3
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00224CB5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetNativeSystemInfo$kernel32.dll
                        • API String ID: 2574300362-192647395
                        • Opcode ID: 31ee7560bfccaf83bdbcc55cb0b5eb13e14a66d0f289c8bc817623b89d5c1fa9
                        • Instruction ID: e2abfa92b3f177283f9353ef0e54e48bb3c83328c92bdbd9bf24a7b0f6c2b7b5
                        • Opcode Fuzzy Hash: 31ee7560bfccaf83bdbcc55cb0b5eb13e14a66d0f289c8bc817623b89d5c1fa9
                        • Instruction Fuzzy Hash: 62D0C770520323DFC720AFB4EB08602B2E4AF0B780B108C3AD88AC2150EA78C890CA20
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00224D2E,?,00224F4F,?,002E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00224D6F
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00224D81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-3689287502
                        • Opcode ID: 1f09827c27050de7a5ada8eec44ffd2196194858797db397d895d1bc2d5854bf
                        • Instruction ID: 6584d73e8e499bb1f5c6242bfcef0be817c9115994980a0f0b5de21e2265d15b
                        • Opcode Fuzzy Hash: 1f09827c27050de7a5ada8eec44ffd2196194858797db397d895d1bc2d5854bf
                        • Instruction Fuzzy Hash: 03D01230520723DFD7206FB1E94865676E8AF16752B51C93AD486D6250EA74D890CA60
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00224CE1,?), ref: 00224DA2
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00224DB4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 2574300362-1355242751
                        • Opcode ID: 8f0fecf7d5252d9a1cb99ec6d1662f180203042749c97978327a28f50f3aa1c1
                        • Instruction ID: 17845c8302b6126d26ee9e692df7d03198aa15033441d684da16e0942b40cd7b
                        • Opcode Fuzzy Hash: 8f0fecf7d5252d9a1cb99ec6d1662f180203042749c97978327a28f50f3aa1c1
                        • Instruction Fuzzy Hash: D4D01230560723DFD7206FB1E94864676E4AF06355B11883AD8C5D6150EB74D890C660
                        APIs
                        • LoadLibraryA.KERNEL32(advapi32.dll,?,002A10C1), ref: 002A0E80
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 002A0E92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2574300362-4033151799
                        • Opcode ID: e80d2635a5866595bc9dcb8e6f7f2746ff431002e312fb0a234146dc13124987
                        • Instruction ID: 24399773ee05e01a03e94a10bf021acd6c9560ab1ddec9d148c9550fd15c33b0
                        • Opcode Fuzzy Hash: e80d2635a5866595bc9dcb8e6f7f2746ff431002e312fb0a234146dc13124987
                        • Instruction Fuzzy Hash: 5ED01270920713CFD7205F75EA48646B6D4AF06391B518C7AE489D2250DA74D8D0C650
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00298E09,?,002AF910), ref: 00299203
                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00299215
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AddressLibraryLoadProc
                        • String ID: GetModuleHandleExW$kernel32.dll
                        • API String ID: 2574300362-199464113
                        • Opcode ID: 1a9ed089309dac4e015b1c3156ed1786a94c13b4b9ebaef35ec906962fffb96e
                        • Instruction ID: cca69bf6b65cbec1b05037f3c283fccf59209f6bd4cb8d23c9981d2f04c88481
                        • Opcode Fuzzy Hash: 1a9ed089309dac4e015b1c3156ed1786a94c13b4b9ebaef35ec906962fffb96e
                        • Instruction Fuzzy Hash: 28D0C230960313DFCB305F75DE0810272E5AF16351B008C3EDC85C6550EA74C8E0CB20
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LocalTime__swprintf
                        • String ID: %.3d$WIN_XPe
                        • API String ID: 2070861257-2409531811
                        • Opcode ID: 609fbe55332fcc7ef107d68a3493b1002c86c4464dda1bbea7f96cc01df2a267
                        • Instruction ID: 923f976990be17d3044090bf80d0d2198d05e21f60eb63731694b95486340443
                        • Opcode Fuzzy Hash: 609fbe55332fcc7ef107d68a3493b1002c86c4464dda1bbea7f96cc01df2a267
                        • Instruction Fuzzy Hash: ADD01271C35119EBCB54D7D099859FD737CA708300F284552F406A1040E6A5EFF4EA21
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 65c4e08b4f72af35c100d2182f9fc60dbac006e3dc506b74e3ef473d6acc78cd
                        • Instruction ID: 40c8b22cf3d8290aa33ee9dfedbded0ce0e28b40b1e44df877146207c55a4160
                        • Opcode Fuzzy Hash: 65c4e08b4f72af35c100d2182f9fc60dbac006e3dc506b74e3ef473d6acc78cd
                        • Instruction Fuzzy Hash: D0C17E74A14216EFDB14CFA8C884EAEF7B9FF48714B118598E809EB251D770ED91CB90
                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 0029E1D2
                        • CharLowerBuffW.USER32(?,?), ref: 0029E215
                          • Part of subcall function 0029D8B9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0029D8D9
                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0029E415
                        • _memmove.LIBCMT ref: 0029E428
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: BuffCharLower$AllocVirtual_memmove
                        • String ID:
                        • API String ID: 3659485706-0
                        • Opcode ID: e832d2fd97f313dd5edd0bfd3089ae6d8d8637adf1d8d98656d94240c86c0abb
                        • Instruction ID: 6c017ade0885f6c89cc311651d8080e9d28d35927d0c8bd3765d996c4061e542
                        • Opcode Fuzzy Hash: e832d2fd97f313dd5edd0bfd3089ae6d8d8637adf1d8d98656d94240c86c0abb
                        • Instruction Fuzzy Hash: 00C19971A283119FCB04DF28C48096ABBE4FF88714F15896EF8999B351D730E956CF82
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 002981D8
                        • CoUninitialize.OLE32 ref: 002981E3
                          • Part of subcall function 0027D87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0027D8E3
                        • VariantInit.OLEAUT32(?), ref: 002981EE
                        • VariantClear.OLEAUT32(?), ref: 002984BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                        • String ID:
                        • API String ID: 780911581-0
                        • Opcode ID: 787fe398e8b076092172bcfebd56e022ac4ce95a29b60bbd8a7e1dcf649e6e25
                        • Instruction ID: 10e403f691af8272055659b4cd41761b1d93006361b5d64648347ef9fc6f1e42
                        • Opcode Fuzzy Hash: 787fe398e8b076092172bcfebd56e022ac4ce95a29b60bbd8a7e1dcf649e6e25
                        • Instruction Fuzzy Hash: 5FA15935624712AFDB10DF54C481B2AB7E4BF89720F18484DF99A9B3A1CB74ED90CB45
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$AllocClearCopyInitString
                        • String ID:
                        • API String ID: 2808897238-0
                        • Opcode ID: 6f26d7ab3df3fe15050f227f35357854de80e451567d072191f1721ec53c21ce
                        • Instruction ID: a22d59f05eb2847c74a8d33ca5c1f7f2ae70c776370e77dec24e2761186c121c
                        • Opcode Fuzzy Hash: 6f26d7ab3df3fe15050f227f35357854de80e451567d072191f1721ec53c21ce
                        • Instruction Fuzzy Hash: 2C51B734734B029FDB34AF65D499A69B3E5EF05310F20C82FE59EC7691DEB498A08B11
                        APIs
                        • GetWindowRect.USER32(011DD948,?), ref: 002A9895
                        • ScreenToClient.USER32(00000002,00000002), ref: 002A98C8
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 002A9935
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: 02f98da5a3f3a1c0f276ac7a643af31f857ed5a0ceef7c2056ba7809f85e72a1
                        • Instruction ID: 8654c8c43948638571f04cc0bcfa46c56ba208b90a13ffb5100199387bb1e5b6
                        • Opcode Fuzzy Hash: 02f98da5a3f3a1c0f276ac7a643af31f857ed5a0ceef7c2056ba7809f85e72a1
                        • Instruction Fuzzy Hash: 0B51433491020AEFCF14DF55D9849AE7BB5FF86360F108159F8559B2A0DB31ADA1CF90
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00296AE7
                        • WSAGetLastError.WSOCK32(00000000), ref: 00296AF7
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00296B5B
                        • WSAGetLastError.WSOCK32(00000000), ref: 00296B67
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ErrorLast$__itow__swprintfsocket
                        • String ID:
                        • API String ID: 2214342067-0
                        • Opcode ID: 34f54da622271d7a8f3983887162ea1d20e82a75340f5ec8702ef51e7be50661
                        • Instruction ID: 5db92f52b2be4c01511b5581c6a206cfc5a3b4dd63434a033697bbd9c9d3bcce
                        • Opcode Fuzzy Hash: 34f54da622271d7a8f3983887162ea1d20e82a75340f5ec8702ef51e7be50661
                        • Instruction Fuzzy Hash: A941B734750210BFEB20AF64EC8BF3A77E59F04B14F048418FA599B2D2DA749C508F51
                        APIs
                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,002AF910), ref: 002965BD
                        • _strlen.LIBCMT ref: 002965EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _strlen
                        • String ID:
                        • API String ID: 4218353326-0
                        • Opcode ID: 893b5e6e36456366f1a315a1a5873c6d8d5f2caa93d976094358927af7807684
                        • Instruction ID: 007a42a8bff690b216b12856f2a068a966e591b1d30ddc7df32feff16d459898
                        • Opcode Fuzzy Hash: 893b5e6e36456366f1a315a1a5873c6d8d5f2caa93d976094358927af7807684
                        • Instruction Fuzzy Hash: 7D41E330520114AFCF14EBA4EDC9EAEB3E9AF44310F148165F81997292DF34AD64CF50
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0028B92A
                        • GetLastError.KERNEL32(?,00000000), ref: 0028B950
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0028B975
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0028B9A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 77be938005a2b24bdb2ed2b54c45f2d1bdfd74fed43e90ef885449ad92d6de96
                        • Instruction ID: 03f04d309c34ca214bda1b41bc07b220851f84ce6c580655cc1cb18b1e5722f9
                        • Opcode Fuzzy Hash: 77be938005a2b24bdb2ed2b54c45f2d1bdfd74fed43e90ef885449ad92d6de96
                        • Instruction Fuzzy Hash: FC415B39610621EFCB21EF54D545A19BBE1EF89320F198488EC4A9B362CB35FD90CF91
                        APIs
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002A8910
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InvalidateRect
                        • String ID:
                        • API String ID: 634782764-0
                        • Opcode ID: 558396328c1e428ab5d5fc108399bfded1382a7bccd40461dec0de472063accd
                        • Instruction ID: ac29a1ac30ed34aa51db9168aed63c63c81891dbb619ade4cad9b01429a8e2a0
                        • Opcode Fuzzy Hash: 558396328c1e428ab5d5fc108399bfded1382a7bccd40461dec0de472063accd
                        • Instruction Fuzzy Hash: 3831F23067010ABFEF249E54DC89BBE77A5EB07310F544115FA51E73E0CF7499A08A52
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 002AAB92
                        • GetWindowRect.USER32(?,?), ref: 002AAC08
                        • PtInRect.USER32(?,?,002AC07E), ref: 002AAC18
                        • MessageBeep.USER32(00000000), ref: 002AAC89
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: 3932203f937e002deee8aab67359ad17b8eab3bdc08aa4bdcf4efe0832d71234
                        • Instruction ID: 848d6808cdd576b7bb1b5209748ec4c151528058defad17962fa9e9422250ea4
                        • Opcode Fuzzy Hash: 3932203f937e002deee8aab67359ad17b8eab3bdc08aa4bdcf4efe0832d71234
                        • Instruction Fuzzy Hash: 3D418D30660256DFEB11CF58D988B597BF6FF4A324F1480AAE8148F260DB30A855CF92
                        APIs
                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00280E58
                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00280E74
                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00280EDA
                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00280F2C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 5d651d58542e17e50311e80fa89829ba8dd3e684a79f4e5964ba2ba99a01fad2
                        • Instruction ID: efd0e7c34761559cf967243a6682bfc666305fc0f27721ed7ca79ed033101a24
                        • Opcode Fuzzy Hash: 5d651d58542e17e50311e80fa89829ba8dd3e684a79f4e5964ba2ba99a01fad2
                        • Instruction Fuzzy Hash: 3B318B34972209AEFBB0AE248C89BFF7B69EB49310F08461AF4C0511D1C77448799751
                        APIs
                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00280F97
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00280FB3
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00281012
                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00281064
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 16b282d1c597936936392ef5555848c545bdcd63c3699fd32d4f395abe1a8733
                        • Instruction ID: 16eab7b3d0729334221a058d3002c52fa20da79db2cb41f76fb5b5ee7b901242
                        • Opcode Fuzzy Hash: 16b282d1c597936936392ef5555848c545bdcd63c3699fd32d4f395abe1a8733
                        • Instruction Fuzzy Hash: 53318C34D26399DEFF34AE64CC08BFABB6DAB45310F04821AF885521D1C77889F69761
                        APIs
                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0025637B
                        • __isleadbyte_l.LIBCMT ref: 002563A9
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 002563D7
                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0025640D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                        • String ID:
                        • API String ID: 3058430110-0
                        • Opcode ID: b7327724392d38859838295eca8b17365a17851bfe046445a732b4c941334820
                        • Instruction ID: 055262680242e57ce86c714af74d4172331ef01ed1eac0e09814bc0ccb11ba8b
                        • Opcode Fuzzy Hash: b7327724392d38859838295eca8b17365a17851bfe046445a732b4c941334820
                        • Instruction Fuzzy Hash: C531F231620246FFDB218F75C848B6A7BB5FF41712F554169EC14870A0E730DC68DB94
                        APIs
                        • GetForegroundWindow.USER32 ref: 002A4F6B
                          • Part of subcall function 00283685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0028369F
                          • Part of subcall function 00283685: GetCurrentThreadId.KERNEL32 ref: 002836A6
                          • Part of subcall function 00283685: AttachThreadInput.USER32(00000000,?,002850AC), ref: 002836AD
                        • GetCaretPos.USER32(?), ref: 002A4F7C
                        • ClientToScreen.USER32(00000000,?), ref: 002A4FB7
                        • GetForegroundWindow.USER32 ref: 002A4FBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: c6c9227d732791083c4993a49633ff91e15987e7c326e2bd45acdde4aee8352d
                        • Instruction ID: e6273a897ddaa9c0e9cadc5a242e4082650cf5453f67ee0c70b6a6e2356357c6
                        • Opcode Fuzzy Hash: c6c9227d732791083c4993a49633ff91e15987e7c326e2bd45acdde4aee8352d
                        • Instruction Fuzzy Hash: 96312C71D10218AFDB00EFA5D9859EFB7F9EF89300F10406AE505E7241EA759E55CFA0
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • GetCursorPos.USER32(?), ref: 002AC53C
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0025BB2B,?,?,?,?,?), ref: 002AC551
                        • GetCursorPos.USER32(?), ref: 002AC59E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0025BB2B,?,?,?), ref: 002AC5D8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: 63e11fea96c020e88379ed8c4a00c9afc0c55a9df7915037db60b5d652781703
                        • Instruction ID: 3dc6b539978dc8a8bd6cb0487a041ab72bf8837965befc65a4457b91c12419cf
                        • Opcode Fuzzy Hash: 63e11fea96c020e88379ed8c4a00c9afc0c55a9df7915037db60b5d652781703
                        • Instruction Fuzzy Hash: C731FB35910418FFCB15CF94D858DEA7BF5EB4A310F944055F9059B261DB31AD60DFA0
                        APIs
                          • Part of subcall function 00278432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00278449
                          • Part of subcall function 00278432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00278453
                          • Part of subcall function 00278432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00278462
                          • Part of subcall function 00278432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00278469
                          • Part of subcall function 00278432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0027847F
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 002789CB
                        • _memcmp.LIBCMT ref: 002789EE
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00278A24
                        • HeapFree.KERNEL32(00000000), ref: 00278A2B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 0848943cfa7f5eccb6ef6230fb8e3086d23f848e92d5160a615ef79531a6ec4b
                        • Instruction ID: 064ecb26e1244481e277c0b50b24ce846b57dc36665839ec28bc9136c92c19ce
                        • Opcode Fuzzy Hash: 0848943cfa7f5eccb6ef6230fb8e3086d23f848e92d5160a615ef79531a6ec4b
                        • Instruction Fuzzy Hash: 8B217A72E90109EFDB10DFA4C949BFEB7B8EF44315F15809AE858A7240DB30AA15CF51
                        APIs
                        • __setmode.LIBCMT ref: 00240B2E
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0028793F,?,?,00000000), ref: 00225B8C
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0028793F,?,?,00000000,?,?), ref: 00225BB0
                        • _fprintf.LIBCMT ref: 00240B65
                        • OutputDebugStringW.KERNEL32(?), ref: 00276111
                          • Part of subcall function 00244C1A: _flsall.LIBCMT ref: 00244C33
                        • __setmode.LIBCMT ref: 00240B9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                        • String ID:
                        • API String ID: 521402451-0
                        • Opcode ID: f1670b362eba25bc391c8978e8f31dbb94bac0ec4367ea544d30d84d78b1a3d2
                        • Instruction ID: a3d0f0b3dd04037a5b4779540d124b7fd318074dcc4ad825e3c79182cf0e95f9
                        • Opcode Fuzzy Hash: f1670b362eba25bc391c8978e8f31dbb94bac0ec4367ea544d30d84d78b1a3d2
                        • Instruction Fuzzy Hash: B51157329246147EDB0877E4AC87ABD7B6DDF41324F14401AF20867182DE7158B14F95
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 002918B9
                          • Part of subcall function 00291943: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00291962
                          • Part of subcall function 00291943: InternetCloseHandle.WININET(00000000), ref: 002919FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Internet$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 1463438336-0
                        • Opcode ID: 191d014b1fcdd95e8c04d5a43ec9dab67dff1e630a90dcc07fc16457d9ec65f9
                        • Instruction ID: a594e3bfcf26de6467ba2c887b7c5d73dcf9ce7e33bcd3d2ac53c10ba8bb61b7
                        • Opcode Fuzzy Hash: 191d014b1fcdd95e8c04d5a43ec9dab67dff1e630a90dcc07fc16457d9ec65f9
                        • Instruction Fuzzy Hash: F821F075210706BFEF159F61DC14FBAB7A9FF49700F00442AFA1596650DB71D831ABA0
                        APIs
                        • GetFileAttributesW.KERNEL32(?,002AFAC0), ref: 00283AA8
                        • GetLastError.KERNEL32 ref: 00283AB7
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00283AC6
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,002AFAC0), ref: 00283B23
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: b1a42a2501c2d998fd1db967b7392099facea7835f5d2c7764bf4f1ab83fcd1e
                        • Instruction ID: 52a1fcbdb3f43f89eaa723d767727eb7d882e562f558a1ab9f874191548f8aeb
                        • Opcode Fuzzy Hash: b1a42a2501c2d998fd1db967b7392099facea7835f5d2c7764bf4f1ab83fcd1e
                        • Instruction Fuzzy Hash: 0021077451A3119F8700EF64D98089BB7E4EE16B28F144A2DF499C32E1DB30DE25CF82
                        APIs
                        • _free.LIBCMT ref: 00255281
                          • Part of subcall function 0024588C: __FF_MSGBANNER.LIBCMT ref: 002458A3
                          • Part of subcall function 0024588C: __NMSG_WRITE.LIBCMT ref: 002458AA
                          • Part of subcall function 0024588C: RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00240F53,?), ref: 002458CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: b171991fe87ac7bd1c9b60b500f93f124cf3d4733a4a322725c7b3aa05699282
                        • Instruction ID: b91c77c87e3de1a8547114b8878cdb607b49777b9d9de907dc789eceaaa47fa7
                        • Opcode Fuzzy Hash: b171991fe87ac7bd1c9b60b500f93f124cf3d4733a4a322725c7b3aa05699282
                        • Instruction Fuzzy Hash: 8A112332931A22ABCF282FB0FC5961E3798AF01362F20052AFC04DA150DF348D648B98
                        APIs
                        • _memset.LIBCMT ref: 00224560
                          • Part of subcall function 0022410D: _memset.LIBCMT ref: 0022418D
                          • Part of subcall function 0022410D: _wcscpy.LIBCMT ref: 002241E1
                          • Part of subcall function 0022410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 002241F1
                        • KillTimer.USER32(?,00000001,?,?), ref: 002245B5
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 002245C4
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0025D5FE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                        • String ID:
                        • API String ID: 1378193009-0
                        • Opcode ID: efa3f97ab6e21771324f9e8cd77c8bafec871ee7fdbaa2e0d8bda818ee06ac99
                        • Instruction ID: 791c802d86d75e2b0732d0131bc5c96e4661d2f79dd64a7225c9284a9b2166c2
                        • Opcode Fuzzy Hash: efa3f97ab6e21771324f9e8cd77c8bafec871ee7fdbaa2e0d8bda818ee06ac99
                        • Instruction Fuzzy Hash: BE213AB0414394AFEB329F64E849BE7BBEC9F11308F44008DEACA56141D7B41AA88B41
                        APIs
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,0028793F,?,?,00000000), ref: 00225B8C
                          • Part of subcall function 00225B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,0028793F,?,?,00000000,?,?), ref: 00225BB0
                        • gethostbyname.WSOCK32(?,?,?), ref: 002964AF
                        • WSAGetLastError.WSOCK32(00000000), ref: 002964BA
                        • _memmove.LIBCMT ref: 002964E7
                        • inet_ntoa.WSOCK32(?), ref: 002964F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                        • String ID:
                        • API String ID: 1504782959-0
                        • Opcode ID: 64520a150591a487a70b0499489b5c412b4c6fd2922e66014bb6d2de12c775e6
                        • Instruction ID: f28e237cdfebb89185f0251783c8f8dea6d7b53537332118eb19d1fe057270b9
                        • Opcode Fuzzy Hash: 64520a150591a487a70b0499489b5c412b4c6fd2922e66014bb6d2de12c775e6
                        • Instruction Fuzzy Hash: 8D115E31920119AFCF04EBE4ED8ADEEB7B8AF05310B148065F506A7261DF31AE64CF61
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00278E23
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00278E35
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00278E4B
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00278E66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 37b7028828b36390c77a67dea8c3e28d81e11d80fbe61d680d12cad0b212762f
                        • Instruction ID: e114430105069da9f22d0ca489e48b4f44023805438d3a57fb1daec17d52689c
                        • Opcode Fuzzy Hash: 37b7028828b36390c77a67dea8c3e28d81e11d80fbe61d680d12cad0b212762f
                        • Instruction Fuzzy Hash: D4113679940219BFEB10DFA5C885E9DBBB8FB08710F204095FA04B7290DB716E20DB90
                        APIs
                          • Part of subcall function 00222612: GetWindowLongW.USER32(?,000000EB), ref: 00222623
                        • DefDlgProcW.USER32(?,00000020,?), ref: 002212D8
                        • GetClientRect.USER32(?,?), ref: 0025B77B
                        • GetCursorPos.USER32(?), ref: 0025B785
                        • ScreenToClient.USER32(?,?), ref: 0025B790
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: 927885f1cc3a4c5a61a39aabf3d8c948ae7af12710d14f0108dcc22734ada2f1
                        • Instruction ID: 73ed38908e3d4ed06ab9d015b3782d33a7d71552ac406a6b7420ee48fdda1d4c
                        • Opcode Fuzzy Hash: 927885f1cc3a4c5a61a39aabf3d8c948ae7af12710d14f0108dcc22734ada2f1
                        • Instruction Fuzzy Hash: 5C115835A20029FBCB10DFE4E989DAE77B8EB16300F400556F911E7250CB30BA618BA5
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0028001E,?,00281071,?,00008000), ref: 00281490
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0028001E,?,00281071,?,00008000), ref: 002814B5
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0028001E,?,00281071,?,00008000), ref: 002814BF
                        • Sleep.KERNEL32(?,?,?,?,?,?,?,0028001E,?,00281071,?,00008000), ref: 002814F2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 40941d91b71ae9961da08e1b3f5a485ae2648295955692f371cf4096f4bee22f
                        • Instruction ID: 247d67e2620078193ffa45f12cd89b44afcaae7ad2457a126ca2c6af36ba414c
                        • Opcode Fuzzy Hash: 40941d91b71ae9961da08e1b3f5a485ae2648295955692f371cf4096f4bee22f
                        • Instruction Fuzzy Hash: 2C112E35C11529D7CF00AFE5E948AEDBB78FF09711F014155EA45B62C0CB7495B28B91
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                        • String ID:
                        • API String ID: 3016257755-0
                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction ID: fabf3959dc1d2e3bfc7962aaa743fdaf96838315d8de1658bfc3ca4424222e05
                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                        • Instruction Fuzzy Hash: 200178320A854ABBCF125E88EC058EE3F26BF18396F488415FE1C58130C736C9B5AB95
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 002AB318
                        • ScreenToClient.USER32(?,?), ref: 002AB330
                        • ScreenToClient.USER32(?,?), ref: 002AB354
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 002AB36F
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: b7be98d634d795836c9b9c19595292e3fd4dd50cbb7dba5fe15c99f8aabd7bb4
                        • Instruction ID: 08131d5a2e2ed44de818a2e252806b6ccefba348b86ae8a0ad2e050c3c5f9142
                        • Opcode Fuzzy Hash: b7be98d634d795836c9b9c19595292e3fd4dd50cbb7dba5fe15c99f8aabd7bb4
                        • Instruction Fuzzy Hash: 7B114675D00209EFDB41CF98D5849EEBBB9FB09310F104166E924E3620D735AA65CF90
                        APIs
                        • EnterCriticalSection.KERNEL32(?), ref: 00286C8F
                          • Part of subcall function 0028776D: _memset.LIBCMT ref: 002877A2
                        • _memmove.LIBCMT ref: 00286CB2
                        • _memset.LIBCMT ref: 00286CBF
                        • LeaveCriticalSection.KERNEL32(?), ref: 00286CCF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CriticalSection_memset$EnterLeave_memmove
                        • String ID:
                        • API String ID: 48991266-0
                        • Opcode ID: c6e65d6dc60e7c4f7fcd4f0bb09e682f5051da3d4cb71f6d05d8c1ffe2ab418a
                        • Instruction ID: 494142aa6849f463acae1b709aec5d6ad258735a3d397eb79c32ac27b34d70e3
                        • Opcode Fuzzy Hash: c6e65d6dc60e7c4f7fcd4f0bb09e682f5051da3d4cb71f6d05d8c1ffe2ab418a
                        • Instruction Fuzzy Hash: BEF0543A105104ABCF416F55EC85E49BB29FF45320F548065FE085E25BCB35E825CFB4
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0027A179
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0027A18C
                        • GetCurrentThreadId.KERNEL32 ref: 0027A193
                        • AttachThreadInput.USER32(00000000), ref: 0027A19A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 194bff0f415bfd03e76af1dcaac8fb14be326da9c3cbbfb951ab43de8885cb80
                        • Instruction ID: 64ad1e6f2a109b4ddc9debb3a166c1e5e38dab9efce08a93f0c08ec938bf42bc
                        • Opcode Fuzzy Hash: 194bff0f415bfd03e76af1dcaac8fb14be326da9c3cbbfb951ab43de8885cb80
                        • Instruction Fuzzy Hash: 44E0C931545228BBEB605FA2ED0DEDB7F5CEF26BB1F408025F51D95060CA758550CBA1
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00222231
                        • SetTextColor.GDI32(?,000000FF), ref: 0022223B
                        • SetBkMode.GDI32(?,00000001), ref: 00222250
                        • GetStockObject.GDI32(00000005), ref: 00222258
                        • GetWindowDC.USER32(?,00000000), ref: 0025C003
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 0025C010
                        • GetPixel.GDI32(00000000,?,00000000), ref: 0025C029
                        • GetPixel.GDI32(00000000,00000000,?), ref: 0025C042
                        • GetPixel.GDI32(00000000,?,?), ref: 0025C062
                        • ReleaseDC.USER32(?,00000000), ref: 0025C06D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                        • String ID:
                        • API String ID: 1946975507-0
                        • Opcode ID: 6cffc69297b35211c0a93b68e26e7aef430a50f41df2a5fc4b32a9f92aa9d0eb
                        • Instruction ID: 621059218cf7b52be811eb7b2a7d3737d72b93a5c35d0fdf07e861b5aa0f3709
                        • Opcode Fuzzy Hash: 6cffc69297b35211c0a93b68e26e7aef430a50f41df2a5fc4b32a9f92aa9d0eb
                        • Instruction Fuzzy Hash: 6AE03932504245EBEB615FA4FD0D7D87B10EB06332F108366FA69480E18B7649A4DB22
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00278A43
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,0027860E), ref: 00278A4A
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0027860E), ref: 00278A57
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,0027860E), ref: 00278A5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: acb56ec51706b8d6c3f0c35ac01015da2f31e41d57bfa2a7a862c2a1adc8ef95
                        • Instruction ID: 7c18a7e6c610f25cea3128bc55c3ddf53f8d30255cb22e5f6678e33cf4a3be4f
                        • Opcode Fuzzy Hash: acb56ec51706b8d6c3f0c35ac01015da2f31e41d57bfa2a7a862c2a1adc8ef95
                        • Instruction Fuzzy Hash: 04E08636745211DFD7A05FF17E0CB973BACEF52792F048868B645C9044DE389441C750
                        APIs
                        • GetDesktopWindow.USER32 ref: 002620B6
                        • GetDC.USER32(00000000), ref: 002620C0
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 002620E0
                        • ReleaseDC.USER32(?), ref: 00262101
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: c3932a6b87d90a73b10f84a73efc3771de8ab935137e95c0253bc91b63b67007
                        • Instruction ID: 571186ae3abec3bc90c4d515c800614902a0f32829b760ede2095b8c9989afcc
                        • Opcode Fuzzy Hash: c3932a6b87d90a73b10f84a73efc3771de8ab935137e95c0253bc91b63b67007
                        • Instruction Fuzzy Hash: 43E0E575810214EFCB519FA0EA0C69DBBB9EB5D711F208425F86A97260CB7981919F40
                        APIs
                        • GetDesktopWindow.USER32 ref: 002620CA
                        • GetDC.USER32(00000000), ref: 002620D4
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 002620E0
                        • ReleaseDC.USER32(?), ref: 00262101
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 72642b95cf9ec0b562f5df79543073406e5cd0391efaecbb18b088420ccb6c21
                        • Instruction ID: 50be5b281cb5ac82db2b0c7d18ba9e6e2705e40343f9db342992e626fbd26708
                        • Opcode Fuzzy Hash: 72642b95cf9ec0b562f5df79543073406e5cd0391efaecbb18b088420ccb6c21
                        • Instruction Fuzzy Hash: 14E01A75C10214AFCB519FF0EA0C69DBBF9EB4D711F108025F96A97220CB7C91419F40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID:
                        • String ID: %+
                        • API String ID: 0-2692660539
                        • Opcode ID: bd3f06ca687e2a5e64bfe203d4a7edcec7e04f297e9b0ddd086c9a0404671778
                        • Instruction ID: a5153210767d815bc7a491068c64ced4a37d0576bcdb33d42172dd17cc4b758c
                        • Opcode Fuzzy Hash: bd3f06ca687e2a5e64bfe203d4a7edcec7e04f297e9b0ddd086c9a0404671778
                        • Instruction Fuzzy Hash: CDB1BE7282412ABACF24EFD4E4899FEB7B8EF04310F504026E942A7194DB349EB5CB51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: __itow_s
                        • String ID: xb.$xb.
                        • API String ID: 3653519197-2273934189
                        • Opcode ID: fa8ff674df954ef09b56ab815a9370ec36117916c8c74dffe65793d0be5c2e37
                        • Instruction ID: c0e71568637cb237b93e0a21e24f732b72d776fbcf06b3b1a30d9722a0ad592a
                        • Opcode Fuzzy Hash: fa8ff674df954ef09b56ab815a9370ec36117916c8c74dffe65793d0be5c2e37
                        • Instruction Fuzzy Hash: 8DB1AD30A10219AFDF15DF94E990EBEB7B9FF58300F148059F9459B291EB70E9A1CB60
                        APIs
                          • Part of subcall function 0023FE06: _wcscpy.LIBCMT ref: 0023FE29
                          • Part of subcall function 00229997: __itow.LIBCMT ref: 002299C2
                          • Part of subcall function 00229997: __swprintf.LIBCMT ref: 00229A0C
                        • __wcsnicmp.LIBCMT ref: 0028B0B9
                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0028B182
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                        • String ID: LPT
                        • API String ID: 3222508074-1350329615
                        • Opcode ID: 14c5923e65e99c6b322c19b34cef9ed82fb4e73e78ffbae8f1818d8116ff9fcf
                        • Instruction ID: 0a7796a20438473457f0306fb8fac28e3b29f42efeb96b03cc7726c919f3d712
                        • Opcode Fuzzy Hash: 14c5923e65e99c6b322c19b34cef9ed82fb4e73e78ffbae8f1818d8116ff9fcf
                        • Instruction Fuzzy Hash: F561B579E20215AFCB15EF94C895EAEB7B4EF08310F10405DF94AAB391DB70AE94CB50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _memmove
                        • String ID: Oa#
                        • API String ID: 4104443479-1510357115
                        • Opcode ID: dc83d41a7ccc98d2b9a5e6c114e4650131a7a021eb05bb8d21038784f30c37ec
                        • Instruction ID: 61155ba792cb2bba77ca27de5409597f7c7f88ba783475f952ea11aa03eccaa9
                        • Opcode Fuzzy Hash: dc83d41a7ccc98d2b9a5e6c114e4650131a7a021eb05bb8d21038784f30c37ec
                        • Instruction Fuzzy Hash: 4E513DB0A1161A9FCF24CF68D484ABEB7F1FF44304F248569E85AD7240EB31A9A5CB51
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00232AC8
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00232AE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 03ccad3ffe60a9a2e4b6e8776358c172df9b59f1c065126ba39c5327379d6510
                        • Instruction ID: ad4f7921fc3c28ac4d5a9a99ee552ad78f0f3c1102391cc4226df6a1cca17359
                        • Opcode Fuzzy Hash: 03ccad3ffe60a9a2e4b6e8776358c172df9b59f1c065126ba39c5327379d6510
                        • Instruction Fuzzy Hash: 74517772428758ABD320AF50EC86BAFBBE8FF85310F41884DF1D9410A1DB708579CB66
                        APIs
                          • Part of subcall function 0022506B: __fread_nolock.LIBCMT ref: 00225089
                        • _wcscmp.LIBCMT ref: 002898CD
                        • _wcscmp.LIBCMT ref: 002898E0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: _wcscmp$__fread_nolock
                        • String ID: FILE
                        • API String ID: 4029003684-3121273764
                        • Opcode ID: 41a8e5e7907d5abbfd5a106b64174f58f4015f4f0e3d718a8c4fae47c8fc7560
                        • Instruction ID: 577f61b9ecb37ea8c90de60fbd5c26bd9e74d8d7a6442b7f7c18328bc7885d6d
                        • Opcode Fuzzy Hash: 41a8e5e7907d5abbfd5a106b64174f58f4015f4f0e3d718a8c4fae47c8fc7560
                        • Instruction Fuzzy Hash: F2412671A1062ABADF20AEE4DC85FEFB7BDDF49710F044469F900A71C0CA719E548BA1
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClearVariant
                        • String ID: Dd.$Dd.
                        • API String ID: 1473721057-1161358372
                        • Opcode ID: 5c9f7b5abf918a0c621c93ccfa861f3ddc7ccedc73ac34ce365e4ce96b256528
                        • Instruction ID: c191b160abe7d584ec29aefb05cfabf5d728d59a469b1ea44ba71b5558da10be
                        • Opcode Fuzzy Hash: 5c9f7b5abf918a0c621c93ccfa861f3ddc7ccedc73ac34ce365e4ce96b256528
                        • Instruction Fuzzy Hash: 73513674624352DFC760CF59D484A1ABBF1BB98384F54885CE9818B761D331ECA0CF82
                        APIs
                        • _memset.LIBCMT ref: 002926B4
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 002926EA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CrackInternet_memset
                        • String ID: |
                        • API String ID: 1413715105-2343686810
                        • Opcode ID: 9674bcb231827d6aebc2de0a18d3b28442fa1a3520a8966fea79fda440818853
                        • Instruction ID: edbad5c10a64f0899e89834783e32fab3bc08b3e15da8b10028fd1a6b1fe1f42
                        • Opcode Fuzzy Hash: 9674bcb231827d6aebc2de0a18d3b28442fa1a3520a8966fea79fda440818853
                        • Instruction Fuzzy Hash: 1B310571824119BFCF01AFA1DC85EEEBFB9FF08310F104069F814A6166EA355A66DB60
                        APIs
                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 002A7B93
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 002A7BA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: b071b0b564238ebb9809a61a6db3b23d95e0485626a775c59ec04547797e3969
                        • Instruction ID: a057ee0f0ddbe87be7e74eb909f6801e0ff7438ff1719a486ee01edd7ed6f455
                        • Opcode Fuzzy Hash: b071b0b564238ebb9809a61a6db3b23d95e0485626a775c59ec04547797e3969
                        • Instruction Fuzzy Hash: 1D412A75A1530AEFDB14CFA4D880BDABBB5FB09304F10046AE904AB351DB70A951CFA4
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 002A6B49
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 002A6B85
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: e30eb37c407d4bdbde05dcab71aad4f210c6491a314d846c39e537d44fc64cd1
                        • Instruction ID: 3d8a38d9c48c3483978c87de238c74d9bf0e5ead73dce9db14b9d95abb265145
                        • Opcode Fuzzy Hash: e30eb37c407d4bdbde05dcab71aad4f210c6491a314d846c39e537d44fc64cd1
                        • Instruction Fuzzy Hash: 64319C71120605AFEB109F68DC85AFB73A9FF49724F148619F8A6D7190DF34ACA1CB60
                        APIs
                        • _memset.LIBCMT ref: 00282C09
                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00282C44
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: df5fdd45a7f8385a1ddc850d73f0cd525490248acc59de2f26bee9a068b32701
                        • Instruction ID: dcb66f02aa70354ae04759f2d3cb02b4c0752f6c4f0543369600dc93f9184162
                        • Opcode Fuzzy Hash: df5fdd45a7f8385a1ddc850d73f0cd525490248acc59de2f26bee9a068b32701
                        • Instruction Fuzzy Hash: 5331273562130ADFDB34EF48D9857BEBBB8EF04300F15001AEC85A61E0D7709A68CB10
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 002A6793
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 002A679E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: 2e4a288306f44c85d2e8573a225756e728ed7d2ebd69fd99fd257ebb67af9d50
                        • Instruction ID: c124a489c6510c00a90b7b51a1eef3a16cee2140d1907d09ba9ec262b5705513
                        • Opcode Fuzzy Hash: 2e4a288306f44c85d2e8573a225756e728ed7d2ebd69fd99fd257ebb67af9d50
                        • Instruction Fuzzy Hash: 2711E6756301096FEF11DF14DC88EBB776AEB45368F140124F91497290DB319C718BA0
                        APIs
                          • Part of subcall function 00221D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00221D73
                          • Part of subcall function 00221D35: GetStockObject.GDI32(00000011), ref: 00221D87
                          • Part of subcall function 00221D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00221D91
                        • GetWindowRect.USER32(00000000,?), ref: 002A6CA3
                        • GetSysColor.USER32(00000012), ref: 002A6CBD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: ee9370e9058bed885495372fdc7b04a66382a55924eebb1b44f65b2d339dec2e
                        • Instruction ID: 124ea46cd7113d040f7689073573b3075faf2c993e641ca1d812893c696dbb04
                        • Opcode Fuzzy Hash: ee9370e9058bed885495372fdc7b04a66382a55924eebb1b44f65b2d339dec2e
                        • Instruction Fuzzy Hash: A821597292020AAFDB04DFA8DC49AFA7BA9EB09314F044629FD55D2250EB35E860DB50
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 002A69D4
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002A69E3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: 470a59db487a92ed61f3b3b6b35d01a3771823e6bfdde7aa90df044bea3862f2
                        • Instruction ID: e4abba0722ae3c0d43bce96d19f05f1b920fbd00d24200aa4224dba009d5bcb7
                        • Opcode Fuzzy Hash: 470a59db487a92ed61f3b3b6b35d01a3771823e6bfdde7aa90df044bea3862f2
                        • Instruction Fuzzy Hash: 4D11BF71520206AFEF104F74EC48AFB3769EB06368F544724F9A0971E0CB35DC609B60
                        APIs
                        • _memset.LIBCMT ref: 00282D1A
                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00282D39
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: InfoItemMenu_memset
                        • String ID: 0
                        • API String ID: 2223754486-4108050209
                        • Opcode ID: 4237782cdb6e6d673d7e6e45987075bf4c3654b975bd95caa3b797efb9a70211
                        • Instruction ID: 81e82af16cd8fec071661278934c26b1ae3ea781b5a3474e983ce26b2a6171c7
                        • Opcode Fuzzy Hash: 4237782cdb6e6d673d7e6e45987075bf4c3654b975bd95caa3b797efb9a70211
                        • Instruction Fuzzy Hash: C1112679D32125EBCB24FF58D888BAD7BA9AB01300F054126EC05AB2E0D770AD1DC790
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00292342
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0029236B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: dd7b248c483c75b109cba6ad6353259e7e940308cb3298c60f08e9dd0297c0e0
                        • Instruction ID: ea5e415abd32ef1830f9a3785a9a9a59c78fe954bde074d57f0cdd6718584ca6
                        • Opcode Fuzzy Hash: dd7b248c483c75b109cba6ad6353259e7e940308cb3298c60f08e9dd0297c0e0
                        • Instruction Fuzzy Hash: DF110670521226FADF248F518C88EFBFB6CFF06351F1041AAF54952000D2B469A8C6F4
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00223C26,002E52F8,?,?,?), ref: 00230ACE
                          • Part of subcall function 00227D2C: _memmove.LIBCMT ref: 00227D66
                        • _wcscat.LIBCMT ref: 00265010
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FullNamePath_memmove_wcscat
                        • String ID: S.
                        • API String ID: 257928180-2842793924
                        • Opcode ID: e8180dffff527088a235e077e71537f7dc60cac6bd87acc9eafa2aeb93d06d92
                        • Instruction ID: 71d3b769aded66482dbda9606979be57a3eaa10178f4e67cf2a26bd87d0cb59a
                        • Opcode Fuzzy Hash: e8180dffff527088a235e077e71537f7dc60cac6bd87acc9eafa2aeb93d06d92
                        • Instruction Fuzzy Hash: 76118271A34218AB8B40EBA4DD41ED9B3B9EF08348F4004A5B948D7251DAB09AA88F64
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00279135
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 9a94496e13f13e1ffc0579b9864b938b38540bcdfddae3fb4c7fd52ad89492f9
                        • Instruction ID: e10b11c305f0b398a0393397962555c9509c59f94a1d6ed8c977c4134daf7a47
                        • Opcode Fuzzy Hash: 9a94496e13f13e1ffc0579b9864b938b38540bcdfddae3fb4c7fd52ad89492f9
                        • Instruction Fuzzy Hash: 7201F531669225ABCB04EBA4CC968FE7369EF07320B144619F83A573D1DA3558289B50
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 0027902D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: dc63faf344985801fece8e056eabdc16e77b4b4b06e62ef31620e644698ed825
                        • Instruction ID: 1290b277e2b175529cac09d229faab9a4ecb9ffb517cf06c3be94bd7d70a400a
                        • Opcode Fuzzy Hash: dc63faf344985801fece8e056eabdc16e77b4b4b06e62ef31620e644698ed825
                        • Instruction Fuzzy Hash: FE01F771A792147BCF14EBA0DD96DFF73A8DF06300F14402AB806A3281DE355E289A71
                        APIs
                          • Part of subcall function 00227F41: _memmove.LIBCMT ref: 00227F82
                          • Part of subcall function 0027AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 0027AEC7
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 002790B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_memmove
                        • String ID: ComboBox$ListBox
                        • API String ID: 372448540-1403004172
                        • Opcode ID: 6a52bc34a34e31b737fe76d5db6961eedcc40d932aca63f2de78147a8838d6ac
                        • Instruction ID: 669aa5d256a3f805c768cf1317f94dee676be06c2d706c73836e36674c8f7b59
                        • Opcode Fuzzy Hash: 6a52bc34a34e31b737fe76d5db6961eedcc40d932aca63f2de78147a8838d6ac
                        • Instruction Fuzzy Hash: E5012B716752157BCF00EBA4CD42DFE73AC9F01310F144025780673382EA365E289A71
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 0027C7F6
                          • Part of subcall function 0027CB06: _memmove.LIBCMT ref: 0027CB50
                          • Part of subcall function 0027CB06: VariantInit.OLEAUT32(00000000), ref: 0027CB72
                          • Part of subcall function 0027CB06: VariantCopy.OLEAUT32(00000000,?), ref: 0027CB7C
                        • VariantClear.OLEAUT32(?), ref: 0027C818
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: Variant$Init$ClearCopy_memmove
                        • String ID: d}-
                        • API String ID: 2932060187-1876025632
                        • Opcode ID: 8953dee91dee8be0a7a2662f137fb13c424b5046de248051a4cf1622b7409445
                        • Instruction ID: 2f0887cc62c814a0ffc9d0db6e2165109d7757ab91d01dc097e296782e5b5f20
                        • Opcode Fuzzy Hash: 8953dee91dee8be0a7a2662f137fb13c424b5046de248051a4cf1622b7409445
                        • Instruction Fuzzy Hash: 13111E719107089FC720DFA9D88589AF7F8FF18314B50862FE58AD7611E771AA54CF90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: ClassName_wcscmp
                        • String ID: #32770
                        • API String ID: 2292705959-463685578
                        • Opcode ID: 789c0d0e09582d13fed335657d2de7206acfe6ccb2b50e6699000e9e8776dba0
                        • Instruction ID: b3ed4eb0051827bedddf4b6972e884386ed31b1a23fede1a12a916b523a83c94
                        • Opcode Fuzzy Hash: 789c0d0e09582d13fed335657d2de7206acfe6ccb2b50e6699000e9e8776dba0
                        • Instruction Fuzzy Hash: 2CE06832A0022A2BD720EB99BC0DFA7F7ACEB05770F010027FC00D3150E9609A1187E0
                        APIs
                          • Part of subcall function 0025B494: _memset.LIBCMT ref: 0025B4A1
                          • Part of subcall function 00240AC0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0025B470,?,?,?,0022100A), ref: 00240AC5
                        • IsDebuggerPresent.KERNEL32(?,?,?,0022100A), ref: 0025B474
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0022100A), ref: 0025B483
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0025B47E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 3158253471-631824599
                        • Opcode ID: 4574b06ba9412f0c38eb0c72c396de5d1aa08f35806ccfdeabf65a80df88003e
                        • Instruction ID: 4fd64d374a548d8a7bee6dd04f7e6509b03518872e01df103f670efc5f038932
                        • Opcode Fuzzy Hash: 4574b06ba9412f0c38eb0c72c396de5d1aa08f35806ccfdeabf65a80df88003e
                        • Instruction Fuzzy Hash: 03E06D702207618BD7719F64E908B467BE0AB04305F018A6CE842C6242EBB4E458CBA1
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002A59D7
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 002A59EA
                          • Part of subcall function 002852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00285363
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 48c3b67801db9d496ee770ca93d16d27e73632f88848a66bdbb152b6e5546375
                        • Instruction ID: ba281815682664d91eb59da29b7e69e8e7aeacab0c99a8c176c4245594f49c3c
                        • Opcode Fuzzy Hash: 48c3b67801db9d496ee770ca93d16d27e73632f88848a66bdbb152b6e5546375
                        • Instruction Fuzzy Hash: 5CD0A931390310B7E2A8BBB0AC4FFA22A14AB01B00F000825B615AA1D0CCE4A8008A10
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002A5A17
                        • PostMessageW.USER32(00000000), ref: 002A5A1E
                          • Part of subcall function 002852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00285363
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1664329592.0000000000221000.00000020.00000001.01000000.00000003.sdmp, Offset: 00220000, based on PE: true
                        • Associated: 00000000.00000002.1664312507.0000000000220000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664373661.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664420214.00000000002DE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1664434161.00000000002E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_220000_z25RFQ945894-PDF.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 9015bd6c5e1a9772f0e47513bcb127de93ce0f3e8ae9364f0bc7eb8445bc417d
                        • Instruction ID: ece61935bad6ac9e0c5d39648257974f53915340e5155533f0e69108f3cb7fe7
                        • Opcode Fuzzy Hash: 9015bd6c5e1a9772f0e47513bcb127de93ce0f3e8ae9364f0bc7eb8445bc417d
                        • Instruction Fuzzy Hash: 65D0A9313803107BE2A8BBB0AC4FF922614AB02B00F000825B611AA1D0CCE4A8008A14